MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 09bcab4d8fff8fdf3d312e82c9300c5f312e8aba41c318c55dd066e88b0f336e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



HijackLoader


Vendor detections: 8


Intelligence 8 IOCs YARA 9 File information Comments

SHA256 hash: 09bcab4d8fff8fdf3d312e82c9300c5f312e8aba41c318c55dd066e88b0f336e
SHA3-384 hash: 743357b6a48a1481c24a4ed0e5b7ead41e05f789d052d2dc322e2697a56808fa6d21eb8498b5e3a311f1cdf7a1686371
SHA1 hash: dc55d3a594913a9d5c7564180f5eabca13edfab6
MD5 hash: bd4b18d65b090fbc2359f2e63b7c4a91
humanhash: kitten-artist-kentucky-ten
File name:09bcab4d8fff8fdf3d312e82c9300c5f312e8aba41c318c55dd066e88b0f336e.zip
Download: download sample
Signature HijackLoader
File size:2'167'549 bytes
First seen:2025-12-23 11:25:56 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 49152:2pftKfZSnMxKkq4q66qwbn4nusIYdG8lD2U7GlmcTCvmde3:2SOkq46z78MuGn6GTmuW
TLSH T1C6A533110803F246A55CE1B1A2AF3BDB0B7ACED79749A06DF89ED126113F4E9014FF96
Magika zip
Reporter JAMESWT_WT
Tags:dcgrezzt-duckdns-org HIjackLoader zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
35
Origin country :
IT IT
File Archive Information

This file archive contains 6 file(s), sorted by their relevance:

File name:Timchesdream.yl
File size:1'213'290 bytes
SHA256 hash: 6eadfd679dea4d5baebc187b36e2dcde526b8b5ac1e7ffe92b50605b8228596a
MD5 hash: 6c9672367066f899180941b5a2fcb354
MIME type:application/octet-stream
Signature HijackLoader
File name:Wee.bi
File size:36'404 bytes
SHA256 hash: b4a4c93168bf255db76333e401547a1a64d96b755536b0ce8b74874fb173000f
MD5 hash: 9d016d8eee9894c8b14b578d500580e5
MIME type:application/octet-stream
Signature HijackLoader
File name:git2-a418d9d.dll
File size:1'755'712 bytes
SHA256 hash: b739fcd97919c94c595f8aa357ec08bb3e54b2a5f60071a898df584647349be7
MD5 hash: c87bca9efa37151bf9c38ba791ea99af
MIME type:application/x-dosexec
Signature HijackLoader
File name:001_FOTO_MULTA_PARA_LECTURAS_002540_00213_REF-001_PDF.exe
File size:50'832 bytes
SHA256 hash: 15e51b552d965ca38a19416e096a0435083d136da8d6ba1e08244ec277dc7f8c
MD5 hash: 008410f27e5d20160007e550245e6e5f
MIME type:application/x-dosexec
Signature HijackLoader
File name:VCRUNTIME140.dll
File size:85'784 bytes
SHA256 hash: 2b7602cc1521101d116995e3e2ddfe0943349806378a0d40add81ba64e359b6c
MD5 hash: 1453290db80241683288f33e6dd5e80e
MIME type:application/x-dosexec
Signature HijackLoader
File name:jli.dll
File size:86'672 bytes
SHA256 hash: 4fc88bcc5730198ab7c2043f8f15dd794bbb60db9843508ff4c13343ece5a14d
MD5 hash: 50b22e09b87d12183951d8f06eb35a12
MIME type:application/x-dosexec
Signature HijackLoader
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
expired-cert invalid-signature microsoft_visual_cc redcap signed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
File Type:
zip
First seen:
2025-09-24T16:26:00Z UTC
Last seen:
2025-09-24T19:59:00Z UTC
Hits:
~10
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Zip Archive
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2025-09-24 20:49:36 UTC
File Type:
Binary (Archive)
Extracted files:
32
AV detection:
18 of 36 (50.00%)
Threat level:
  5/5
Result
Malware family:
hijackloader
Score:
  10/10
Tags:
family:asyncrat family:hijackloader botnet:zzzzzzz--23-set discovery rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Loads dropped DLL
Suspicious use of SetThreadContext
Async RAT payload
AsyncRat
Asyncrat family
Malware Config
C2 Extraction:
dcgrezzt.duckdns.org:55330
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments