MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 02aa89d95e324dc25f418052c22730a207d6cc424df253d07360e348a8d66612. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 4 File information Comments

SHA256 hash: 02aa89d95e324dc25f418052c22730a207d6cc424df253d07360e348a8d66612
SHA3-384 hash: cd24b6bf0c7f0c8d435a161d8fce70ed65a8fbb191dfbabc9bf520a1ab6843dd15abbd605c5a179d3fd2a7d23bf383b1
SHA1 hash: 4dd6458a961bfc0fb586c66871d6caaea0aa49d6
MD5 hash: dcb3e84da90a570b2279a254deb59780
humanhash: bulldog-robin-india-potato
File name:file
Download: download sample
File size:22'040'576 bytes
First seen:2026-02-18 18:48:28 UTC
Last seen:2026-02-18 18:51:54 UTC
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 393216:LaLHgjk9j1e3KhnFULF2v66OApoPJg/2cLjbGbzY+Z5mHi3vEz6FQEzR:SHEk9j1ez2v66rpOJ54jyhEz6Dt
TLSH T1542733A1E2110103C89FD63D8E6D07AC183F6D166506D6DEFB3AB7AD0D326B2F0A1E55
TrID 86.8% (.MSI) Microsoft Windows Installer (454500/1/170)
11.6% (.MST) Windows SDK Setup Transform script (61000/1/5)
1.5% (.) Generic OLE2 / Multistream Compound (8000/1)
Magika msi
Reporter Bitsight
Tags:dropped-by-amadey fbf543 msi


Avatar
Bitsight
url: http://45.61.130.146:333/1.msi

Intelligence


File Origin
# of uploads :
12
# of downloads :
51
Origin country :
US US
Vendor Threat Intelligence
Malware configuration found for:
MSI
Details
Archives
extracted contents of the ZIP archive
MSI
an embedded setup program or component
Verdict:
Malicious
Score:
90.2%
Tags:
trojan agent shell
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug anti-security anti-vm anti-vm base64 base64 CAB cmd crypto expand expired-cert fingerprint installer installer lolbin lolbin packed rundll32 rundll32 sc wix
Gathering data
Gathering data
Result
Malware family:
n/a
Score:
  10/10
Tags:
defense_evasion execution persistence privilege_escalation ransomware
Behaviour
Checks SCSI registry key(s)
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Event Triggered Execution: Installer Packages
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Enumerates connected drives
Creates new service(s)
Executes dropped EXE
Loads dropped DLL
Modifies visibility of existing users in the login screen
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Drops file in Drivers directory
Malware Config
Dropper Extraction:
http://45.61.130.146:8080/enroll
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Microsoft Software Installer (MSI) msi 02aa89d95e324dc25f418052c22730a207d6cc424df253d07360e348a8d66612

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

Comments