MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 05e9b542a6dfc4bf8e11730ea58ca20f5df59ac8cdb09365887e675a37b13281. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA 2 File information Comments

SHA256 hash: 05e9b542a6dfc4bf8e11730ea58ca20f5df59ac8cdb09365887e675a37b13281
SHA3-384 hash: 0e958746e5bc9cf2a4d953b7f62a265f7db049f004a21befc34717c2233eba35fd468d62cef23ca80dd12fee4bd4ec9b
SHA1 hash: c4a0885e861789d615b4c4c0ae4b0f5a0ec346f7
MD5 hash: 4a33eb6fb8daec13786415ac38034034
humanhash: bluebird-iowa-kilo-zebra
File name:file
Download: download sample
File size:571 bytes
First seen:2026-03-27 04:26:30 UTC
Last seen:2026-03-27 04:27:17 UTC
File type:Batch (bat) bat
MIME type:text/x-msdos-batch
ssdeep 12:xF04isrwLpZb8AO6l/CnrCt/6i7aIcr4MZHMJLLhaKhG3BqCzCzZ:E4ilFZFX/6i7k8TF1NhGDCzZ
TLSH T1DEF0AC0778824B1267F20EA34C32F1A2B58A404B71DD86527069C5A17A464E0E43CCDA
Magika batch
Reporter Bitsight
Tags:bat dropped-by-amadey fbf543


Avatar
Bitsight
url: http://192.177.26.196/files/8316621590/krjF0CY.bat

Intelligence


File Origin
# of uploads :
4
# of downloads :
26
Origin country :
US US
Vendor Threat Intelligence
No detections
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Connection attempt
Running batch commands
Launching a process
Searching for synchronization primitives
Launching many processes
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
cmd lolbin unsafe wevtutil.exe
Verdict:
Malicious
Labled as:
BAT/CleanLog.A potentially unsafe application
Result
Gathering data
Result
Malware family:
n/a
Score:
  9/10
Tags:
defense_evasion discovery persistence ransomware
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System Time Discovery
Power Settings
Clears Windows event logs
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:WiltedTulip_Tools_clrlg
Author:Florian Roth (Nextron Systems)
Description:Detects Windows eventlog cleaner used in Operation Wilted Tulip - file clrlg.bat
Reference:http://www.clearskysec.com/tulip
Rule name:WiltedTulip_Tools_clrlg_RID306B
Author:Florian Roth
Description:Detects Windows eventlog cleaner used in Operation Wilted Tulip - file clrlg.bat
Reference:http://www.clearskysec.com/tulip

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Batch (bat) bat 05e9b542a6dfc4bf8e11730ea58ca20f5df59ac8cdb09365887e675a37b13281

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

Comments