MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 41c40cad40ad7a1ee722bc61a8abfd1cb316b6b0d6a8b0969db1458701322e64. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Simda
Vendor detections: 12
| SHA256 hash: | 41c40cad40ad7a1ee722bc61a8abfd1cb316b6b0d6a8b0969db1458701322e64 |
|---|---|
| SHA3-384 hash: | de2fdd6bef340fadc38eddbfa09f8be5bf8e388398582a15f3e19f2cd5ea5474a9138d6b0a44d35c5f3aa5180755474d |
| SHA1 hash: | ddddfb3caeb43cd4d1c2202957bddd6ce8295799 |
| MD5 hash: | c846247ea7a08d47f702c2d1ace76006 |
| humanhash: | pasta-wyoming-xray-nebraska |
| File name: | svchost.exe |
| Download: | download sample |
| Signature | Simda |
| File size: | 798'720 bytes |
| First seen: | 2025-11-23 09:20:55 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 846a8dcbd0f5c9ffbf7cfa1fb2e5b31e (7 x Simda) |
| ssdeep | 6144:b9y9VlVACGmxRoyt1SZq1Q9A9ty5bhJcrs0MurPw/c4hd/B/coyXT3nOGX6T:ilVP1FtEZv9qyFhJy56d/eoyXjn9W |
| TLSH | T1E40523FD772A8766F57A47736A43C31FA02EF3A41984E152F69948623C707A33199382 |
| TrID | 52.7% (.EXE) UPX compressed Win32 Executable (27066/9/6) 12.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 9.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 8.7% (.EXE) Win32 Executable (generic) (4504/4/1) 4.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | exe Simda |
Intelligence
File Origin
IEVendor Threat Intelligence
Result
Behaviour
Result
Result
Behaviour
Unpacked files
4be58f23552773c5d2eae9e54cc40ed8443c342f74c4818d36109cdfffeb15f8
4c2ac723fa0b5835243712cf8f1205701cf441e4a030587f9d64e96a9205a734
853b3e80b9278e7fcf8e9ab37d80d5d8c34e5fb617cf3e77d857b83d494e1fd2
bb76e9ccc65c0ad6714b3841e387667094d23ff6a3f8406c9b7165fa69495372
ddaec2a97a186681672d2cfc0382664d56b3e216470b7ffe8ce09efc92040b71
f77ccd01991f00d8222b4d40b0ee22144478787476146d9d3fc14645bf007480
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CP_Script_Inject_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | Detects attempts to inject code into another process across PE, ELF, Mach-O binaries |
| Rule name: | FreddyBearDropper |
|---|---|
| Author: | Dwarozh Hoshiar |
| Description: | Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip. |
| Rule name: | MALWARE_Win_Simda |
|---|---|
| Author: | ditekShen |
| Description: | Detects Simda / Shifu infostealer |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | SEH__vectored |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | UPX20030XMarkusOberhumerLaszloMolnarJohnReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | UPXv20MarkusLaszloReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | upx_largefile |
|---|---|
| Author: | k3nr9 |
| Rule name: | Windows_Trojan_Zeus_e51c60d7 |
|---|---|
| Author: | Elastic Security |
| Description: | Detects strings used in Zeus web injects. Many other malware families are built on Zeus and may hit on this signature. |
| Reference: | https://www.virusbulletin.com/virusbulletin/2014/10/paper-evolution-webinjects |
| Rule name: | win_simda_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.simda. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.