MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0a4ac8f45a51ed772a35a667c8dd318c2da8f47ea0c92bf814f183de459ddd3f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkWatchman


Vendor detections: 14


Intelligence 14 IOCs YARA 8 File information Comments

SHA256 hash: 0a4ac8f45a51ed772a35a667c8dd318c2da8f47ea0c92bf814f183de459ddd3f
SHA3-384 hash: 84441dc424c0e9c587b0e73591cc62f97009f007e82c114b6efa2b89592a81e6be6a9e62280e1ee35c1a52752879ff37
SHA1 hash: b69c623b93c00a44c1530eeedee7d9c5ebaded94
MD5 hash: 5554f40406629909d764ba4fa36716f4
humanhash: victor-lamp-quebec-mango
File name:0a4ac8f45a51ed772a35a667c8dd318c2da8f47ea0c92bf814f183de459ddd3f.bin
Download: download sample
Signature DarkWatchman
File size:362'552 bytes
First seen:2026-03-31 05:08:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (880 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 6144:zOYGXaPNxdgSdcq2pVZPOJHAbKdq3xv9mT8MpaTYImqbYHqHNzk4H:HGqN/XdctpVtkNq3h9kpScqbvHNzt
Threatray 2'675 similar samples on MalwareBazaar
TLSH T15C74CF02BAF2CCB2D57219335939B7256D7D7C201F24FA1FA3D8696DDE304816225BA3
TrID 92.3% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
2.2% (.EXE) Win64 Executable (generic) (6522/11/2)
1.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.5% (.EXE) Win32 Executable (generic) (4504/4/1)
0.7% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
dhash icon 27d0d8d4d4d8d027 (24 x AgentTesla, 8 x SnakeKeylogger, 7 x Formbook)
Reporter KodaDr
Tags:DarkWatchman exe


Avatar
KodaDr
#DarkWatchman

Intelligence


File Origin
# of uploads :
1
# of downloads :
112
Origin country :
RU RU
Vendor Threat Intelligence
Gathering data
Malware family:
n/a
ID:
1
File name:
0a4ac8f45a51ed772a35a667c8dd318c2da8f47ea0c92bf814f183de459ddd3f.bin
Verdict:
Malicious activity
Analysis date:
2026-03-31 05:10:00 UTC
Tags:
anti-evasion susp-powershell

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
xtreme shell sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% directory
Launching a process
Using the Windows Management Instrumentation requests
Running batch commands
Creating a process with a hidden window
Creating a file in the %AppData% directory
Moving a file to the %temp% directory
Creating a process from a recently created file
Forced system process termination
DNS request
Connection attempt
Sending an HTTP POST request
Creating a file
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug cobalt darkwatchman encrypted fingerprint installer installer masquerade microsoft_visual_cc obfuscated overlay packed sfx unsafe
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-03-23T21:38:00Z UTC
Last seen:
2026-04-02T01:43:00Z UTC
Hits:
~1000
Detections:
Trojan.DelShad.HTTP.C&C Trojan.DarkWatchman.HTTP.C&C Trojan.Agentb.HTTP.C&C Trojan.Win32.DelShad.sb Trojan.Agentb.TCP.C&C PDM:Trojan.Win32.Generic Backdoor.Agent.HTTP.C&C Trojan.Win32.Powershell.d Trojan.Win32.DarkWatchman.e Trojan.Win32.Agent.sb
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.DarkWatchman
Status:
Malicious
First seen:
2026-03-24 05:52:19 UTC
File Type:
PE (Exe)
Extracted files:
20
AV detection:
13 of 24 (54.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery execution
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Checks computer location settings
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Process spawned unexpected child process
Unpacked files
SH256 hash:
0a4ac8f45a51ed772a35a667c8dd318c2da8f47ea0c92bf814f183de459ddd3f
MD5 hash:
5554f40406629909d764ba4fa36716f4
SHA1 hash:
b69c623b93c00a44c1530eeedee7d9c5ebaded94
Malware family:
MintsLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Reference:https://cyfare.net/
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments