Submit Malware Here To Be Blacklisted - 2020 (NO LIVE MALWARE!)

Previous Thread

Please post all undetected malware in this thread.

Post links to results from one of the following services:
Upload these files to one of the following services and post a link to the results:

Please note that Comodo can also identify malware using SHA1 Values, as long as it has already been uploaded to at least one of the above services. If you would prefer to post those instead. It’s not necessary to report a file using more than one of these methods.

Please do not use the submission by email at malwaresubmit[at]avlab.comodo.com anymore because Comodo is no longer monitoring it.

DO NOT attach or link any malware or malicious links to your post.

P.S. Comodo Instant Malware Analysis (CIMA) is no longer active and can no longer be used to submit files to Comodo.

d5c2ea28b74c3771fdb5576778a4b12390d1d781a539cac526fdbd92f49ea984

9bde4384e0f70ff21c846e0d972a740852821970ad29fe6a20a267d60dc151b5

96dd90d6be582c61403ccc6fd4f618bddad8b36b0f3e80540783d84f3f480653

Hi,

Thank you for your submission, we’ll check it.

Kind Regards,
Erik M.

VM protected trojan miner. File size is 273MB so cannot be uploaded to Valkyrie (and many others threat analysis services).

SHA1: A11A991EB8808EA34DBC60253421AC5DBEA7472C

This is a malicious VBS script. It’s pretty embarrassing the Comodo heuristic wasn’t able to detect it, since it does many clearly malicious actions (e.g. it starts attempting to tamper Defender protection).

I have tried to upload it in Valkyrie “no threat found” (surprisingly)…

Hi,

We’ll verify these and add detection if they confirm to be malicious.

Thanks and regards,
Ionel

0f3b285462ea58178e1db67d069e4f2e7a52d7f441807e07f877a5d286ac8893

Hi,

Thank you for your submission, we’ll check it.

Kind Regards,
Erik M.

FakeAV.Trojan.Downloader.Variant.Starter.Gen.Presenoker

Valkyrie Verdict

VirusTotal

Raised Suricata alerts:

suricata > ETPRO MALWARE Win32/Presenoker Requesting Registry Modifications
suricata > ETPRO INFO HTTP Request for Single Char BAT
suricata > ETPRO MALWARE Win32/Presenoker Requesting Batch File M1
suricata > ETPRO MALWARE Win32/Presenoker CnC Checkin
suricata > ET POLICY curl User-Agent Outbound
suricata > ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata > ET INFO Wget Request for Executable
suricata > ETPRO POLICY Inbound Wide .reg File Altering Winlogon Values - Possible Persistence Setup
suricata > ETPRO INFO Inbound Registry Editor File - HKLM Winlogon Single Char EXE (Possible Persistence)
suricata > ETPRO POLICY Inbound Wide .reg File - Disabling Task Manager
suricata > ET POLICY PE EXE or DLL Windows file download HTTP
suricata > ETPRO POLICY Inbound Batch Script - Reassigning File Associations via Registry

Hi,

Thank you for your submission, we’ll check it.

Kind Regards,
Erik M.

Has unfortunately not yet been processed!

I did a detailed analysis of the file already mentioned, which prompted me to change my classification.

The file installs the antivirus software “Zemana Antivirus” and uses a modified installer that downloads malware.

File reputation analysis:

The specified version “3.1.495” has an original size of 12.15 MB (12741568 bytes) and is signed by Thawte, Symantec and Digicert. The installer was created with Inno Setup Module 5 SFX - [v. (5.5.7) [5.5.9 Unicode]] >>> VirusTotal

In contrast, the modified version has a size of 13.80 MB (14473489 bytes) and is NOT signed. The installer was created with Smart Install Maker v5.04.

Some suspicious/malicious Indicators: Compiler: Borland Delphi, Packer: Inno Setup Module 5 SFX - [v. (5.5.7) [5.5.9 Unicode] - Borland Delphi(6-7 or 2005), File has multiple binary anomalies (File ignores DEP, File ignores Code Integrity, ASLR is disabled, Several of the extracted files contain a suspicious timestamp (B.EXE.5E40BCE5.bin" claims program is from Sat Apr 13 17:16:17 2097, “d.exe” claims program is from Tue Nov 3 11:08:34 2082, “c.exe” claims program is from Sun Oct 17 08:55:50 2038), Checksum mismatches the PE header value, PE file has unusual entropy sections, Contains zero size sections, The file contains another file type: Flash, location: overlay, offset: “0x0067A58A” & type: Flash, location: overlay, offset: “0x009EEA83”& type: Smart-installer, location: overlay, offset: “0x0002C600”, The file contains a virtualized section, The file contains multiple shared sections, Imports sensitive libraries (MCI API DLL, Cabinet File API), Installs itself for autorun at Windows startup, Contains ability to listen for incoming connections, Tries to sleep for a long time, Runs a keylogger, Attempts to identify installed AV products by installation directory (Avast, Avira, Combofix, Kaspersky, Mcafee, Bitdefender, AVG), Queries kernel debugger information, Queries process information, Queries sensitive IE security settings, Queries the internet cache settings, Looks for the Windows Idle Time to determine the uptime, Reads the active computer name, Reads the cryptographic machine GUID, Reads the registry for installed applications, Reads terminal service related keys, Changes read-write memory protection to read-execute, Creates guarded memory sections, Writes data to a remote process ( “C:\Windows\System32\findstr.exe” & “C:\Windows\Wget\bin\wget.exe”), Disables Windows Task Manager, Modifies boot configuration settings (command: bcdedit /set “{current}” safeboot “minimal”), Modifies Software Policy Settings, Modifies proxy settings, Uses “C:\Windows\Wget\bin\wget.exe” to downloads additional malware from a host known to be malicious >>> (VirusTotal)

Trojan.Packed.Themida

VirusTotal

Advanced File Analysis System | Valkyrie

APT.MSIL.Trojan

[b]VirusTotal

[b]Advanced File Analysis System | Valkyrie

Generic.Trojan.Downloader

[b]VirusTotal

[b]Advanced File Analysis System | Valkyrie

Trojan.Generic

[b]VirusTotal

[b]Advanced File Analysis System | Valkyrie

VBS.Script.Trojan.Downloader

[b]VirusTotal

[b]Advanced File Analysis System | Valkyrie

PUA.Variant.InstallCore

[b]VirusTotal

[b]Advanced File Analysis System | Valkyrie

Hi,

Thank you for your submission, we’ll check it.

Kind Regards,
Kowsalya R.

The high initial number of detections at “VT” , "Thor APT Scanner" verdict and “zbetcheckin” alert were False Postives and the File is CLEAN!

PuTTY is a free implementation of SSH and Telnet for Windows and Unix platforms, along with an xterm terminal emulator. It is written and maintained primarily by Simon Tatham.

Download PuTTY: latest release (0.78)

Hi pio,

Thank you for reporting this file again.
We’ll check it.

Best regards,
Kowsalya R.

Hello mmalheiros,

Thank you for sharing these, wee’ll verify them.

Best regards,
FlorinG

2c3dfde8b372098d17a767c3c0e104ee22ae5f23845dc2c0d9ccb41cb626a814

Hi,

Thank you for your submission, we’ll check it.

Kind Regards,
Kowsalya R.