MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 0a0c314a32cfbdccbaf3de35bd30ea0da6cd8c524cb2a37f9c795cef709cec47. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 9
| SHA256 hash: | 0a0c314a32cfbdccbaf3de35bd30ea0da6cd8c524cb2a37f9c795cef709cec47 |
|---|---|
| SHA3-384 hash: | c6cc6c6278ea2ced589a97dfc225b907d1a5dd0e31febe97c48b78bad15864144c6873f4aae26e48e9089e0291b0ba14 |
| SHA1 hash: | 5dbdc562614b7fed7c958066a8c01752a737ed96 |
| MD5 hash: | 5ddf524a99908f27d62730d16ecb01a1 |
| humanhash: | washington-six-nebraska-bakerloo |
| File name: | ShadowSouls Setup 2.1.7.exe |
| Download: | download sample |
| File size: | 86'058'967 bytes |
| First seen: | 2025-09-14 11:14:45 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | b34f154ec913d2d2c435cbd644e91687 (525 x GuLoader, 110 x RemcosRAT, 80 x EpsilonStealer) |
| ssdeep | 1572864:8SwbM73YJuGkLZ8vV5mIyB9VrSGvNo0xRfFmvs8wPjPOeWit9pBa:8Sw45LDI4jry2RfFMOPjGeWibza |
| TLSH | T18618336D75B5EB33D03D2970ED6842F80C3A4D93FED04EF79A0068E82DA4527C66925E |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10522/11/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Magika | pebin |
| Reporter | |
| Tags: | exe stealer |
Intelligence
File Origin
# of uploads :
1
# of downloads :
108
Origin country :
NLVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ShadowSoulsSetup2.1.7.exe
Verdict:
Malicious activity
Analysis date:
2025-09-14 11:12:04 UTC
Tags:
anti-evasion discord stealer nodejs python arch-doc
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
extens shell sage
Result
Verdict:
Clean
Maliciousness:
Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Searching for the window
Sending a custom TCP request
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
adaptive-context anti-debug blackhole fingerprint installer microsoft_visual_cc nsis overlay packed
Verdict:
Clean
File Type:
exe x32
First seen:
2025-09-14T01:45:00Z UTC
Last seen:
2025-09-14T01:45:00Z UTC
Hits:
~10
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.spyw.evad
Score:
56 / 100
Signature
Adds a directory exclusion to Windows Defender
Attempt to bypass Chrome Application-Bound Encryption
Disables security and backup related services
Disables Windows Defender (via service or powershell)
Drops large PE files
Loading BitLocker PowerShell Module
Modifies Windows Defender protection settings
Potential malicious VBS script found (suspicious strings)
Sigma detected: Potential Data Stealing Via Chromium Headless Debugging
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Windows Service Tampering
Sigma detected: WScript or CScript Dropper
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Behaviour
Behavior Graph:
Gathering data
Verdict:
Malicious
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
10/10
Tags:
credential_access defense_evasion discovery execution linux spyware stealer trojan
Behaviour
Checks processor information in registry
Enumerates system info in registry
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
An obfuscated cmd.exe command-line is typically used to evade detection.
Enumerates processes with tasklist
Hide Artifacts: Hidden Files and Directories
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Loads dropped DLL
Reads user/profile data of web browsers
Checks computer location settings
Drops startup file
Executes dropped EXE
Command and Scripting Interpreter: PowerShell
Downloads MZ/PE file
Uses browser remote debugging
Windows security bypass
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
exe 0a0c314a32cfbdccbaf3de35bd30ea0da6cd8c524cb2a37f9c795cef709cec47
(this sample)
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.