MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0221d06009b9848a3e1be34405fef1d586b84d115f10109de8f9c2e4806b6f40. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 0221d06009b9848a3e1be34405fef1d586b84d115f10109de8f9c2e4806b6f40
SHA3-384 hash: 9b1de729d3194cd4fb974207ed6ffc8afa2f9d40ef2875bd5091b07428a177851567f78e5631001c3e12c79c38351a69
SHA1 hash: 8431d25f8e5ae6070c369769628b96580d1a2c51
MD5 hash: edcc3636602c6ab944bfa6d5372649d9
humanhash: crazy-high-nuts-whiskey
File name:0221d06009b9848a3e1be34405fef1d586b84d115f10109de8f9c2e4806b6f40.jar
Download: download sample
File size:17'906'007 bytes
First seen:2026-03-17 13:55:37 UTC
Last seen:Never
File type:Java file jar
MIME type:application/zip
ssdeep 393216:tDLHD4oru3NKMYfFZLDLnF5YERMIPDKu2T2vvKM9EY:tD/4OudKbrLDLF5HJB2TQrn
TLSH T1DF071122E046B5F5D99B143620A300A2353D22F6E54BC07894E8AD7E8D5FC4A3F5DB7E
TrID 77.1% (.JAR) Java Archive (13500/1/2)
22.8% (.ZIP) ZIP compressed archive (4000/1)
Magika jar
Reporter JAMESWT_WT
Tags:jar SugarSMP

Intelligence


File Origin
# of uploads :
1
# of downloads :
62
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
0221d06009b9848a3e1be34405fef1d586b84d115f10109de8f9c2e4806b6f40.jar
Verdict:
Malicious activity
Analysis date:
2026-03-17 13:57:18 UTC
Tags:
anti-evasion discord evasion stealer aegis

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
70%
Tags:
shellcode
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm bash evasive lolbin macros-on-close wmic
Verdict:
Malicious
File Type:
jar
Detections:
HEUR:Trojan-PSW.Java.Generic HEUR:Trojan-PSW.Java.Stealer.gen
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion
Behaviour
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments