MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 045d995dee9b3fba080415be55c932f245582c44d70243fc3fbf0174fd3495bd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Patchwork


Vendor detections: 12


Intelligence 12 IOCs YARA 6 File information Comments

SHA256 hash: 045d995dee9b3fba080415be55c932f245582c44d70243fc3fbf0174fd3495bd
SHA3-384 hash: 1f09ada6e4ae521f3bbf56dfb888ab3a88d4c7568570dac2ef2947adaf0dc54296d9595cd6402b00c0751c5baf00f08a
SHA1 hash: 5cf716dc70a0de1656b933c5ac2b1b56bae29f7f
MD5 hash: dcde2aa7d290cf696c8070207577610e
humanhash: july-xray-carbon-berlin
File name:Report_2026.lnk
Download: download sample
Signature Patchwork
File size:3'762 bytes
First seen:2026-04-15 14:02:57 UTC
Last seen:Never
File type:Shortcut (lnk) lnk
MIME type:application/x-ms-shortcut
ssdeep 48:8oruaFktOJRLurzOAGitbD+sqddKHYd0Y9XuHQBqiYLq4:8orXgOzurzOap6sXTY1um3YLq
TLSH T17A717B0427F60254F7B34B3EA8FFA25155767D5CFE319A9D02A0D1480CE5619E83AF2B
Magika lnk
Reporter smica83
Tags:apt lnk Patchwork

Intelligence


File Origin
# of uploads :
1
# of downloads :
53
Origin country :
HU HU
Vendor Threat Intelligence
Malware configuration found for:
LNK
Details
LNK
a command line and any observed urls
Verdict:
Malicious
Score:
90.2%
Tags:
autorun shell sage blic
Result
Verdict:
Malicious
File Type:
LNK File - Malicious
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug evasive fingerprint lolbin macros masquerade packed powershell schtasks
Result
Gathering data
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
88 / 100
Signature
Deletes itself after installation
Drops PE files to the user root directory
Loading BitLocker PowerShell Module
Multi AV Scanner detection for submitted file
Powershell drops PE file
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Uses schtasks.exe or at.exe to add and modify task schedules
Windows shortcut file (LNK) contains suspicious command line arguments
Windows shortcut file (LNK) starts blacklisted processes
Behaviour
Behavior Graph:
Gathering data
Threat name:
Shortcut.Trojan.Generic
Status:
Suspicious
First seen:
2026-04-15 14:04:12 UTC
File Type:
Binary
AV detection:
5 of 36 (13.89%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
patchworkrat
Similar samples:
Result
Malware family:
n/a
Score:
  8/10
Tags:
adware discovery execution persistence spyware
Behaviour
Checks processor information in registry
Modifies Internet Explorer settings
Modifies registry class
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Command and Scripting Interpreter: PowerShell
Looks up external IP address via web service
Checks computer location settings
Deletes itself
Executes dropped EXE
Loads dropped DLL
Badlisted process makes network request
Downloads MZ/PE file
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Archive_in_LNK
Author:@bartblaze
Description:Identifies archive (compressed) files in shortcut (LNK) files.
Rule name:Detect_Remcos_RAT
Author:daniyyell
Description:Detects Remcos RAT payloads and commands
Rule name:Download_in_LNK
Author:@bartblaze
Description:Identifies download artefacts in shortcut (LNK) files.
Rule name:LNK_sospechosos
Author:Germán Fernández
Description:Detecta archivos .lnk sospechosos
Rule name:PDF_in_LNK
Author:@bartblaze
Description:Identifies Adobe Acrobat artefacts in shortcut (LNK) files. A PDF document is typically used as decoy in a malicious LNK.
Rule name:SUSP_LNK_PowerShell
Author:SECUINFRA Falcon Team
Description:Detects the reference to powershell inside an lnk file, which is suspicious

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments