MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0d0ca60de1f5d8df133af2387d3d503ecfdad02fc2daf1ad5ceb3d1124d24336. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA 9 File information Comments

SHA256 hash: 0d0ca60de1f5d8df133af2387d3d503ecfdad02fc2daf1ad5ceb3d1124d24336
SHA3-384 hash: b8b8a1a9113785871d700619ce1b7137fb45832e6bf1edfbf7d03a80232e0689f5537ee99faf9a4e51c11403004bc99b
SHA1 hash: fa0ad6ba38f5a18e03116e1c65912a8177ec1df5
MD5 hash: 309c63c708c1378da092f1872627c4c6
humanhash: river-sodium-pennsylvania-blue
File name:Osnnq.dll
Download: download sample
File size:808'960 bytes
First seen:2026-02-24 14:56:27 UTC
Last seen:2026-02-24 15:30:30 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash dae02f32a21e03ce65412f6e56942daa (123 x YellowCockatoo, 60 x CobaltStrike, 44 x JanelaRAT)
ssdeep 6144:Lhxz6DKlZod0d2JpqgWAiw4smnNdNIGBMv6AJlulFZ1ghKM0Xp9ZkmQE2I/23hVW:Lvftq4smnHNIAscrZkWR4hVucQOUdW
TLSH T1A105180673858E52D12A1332C1E70C0087F7A68A776BD71F7A86676968833DEDF06397
TrID 88.5% (.DLL) Generic .NET DLL/Assembly (236632/4/32)
2.4% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
2.4% (.EXE) Win64 Executable (generic) (6522/11/2)
1.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.6% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter James_inthe_box
Tags:dll exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
130
Origin country :
US US
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
base64 net_reactor obfuscated obfuscated packed reconnaissance soft-404
Verdict:
Malware
YARA:
12 match(es)
Tags:
.Net .Net Obfuscator .Net Reactor Executable Managed .NET PE (Portable Executable) PE File Layout SOS: 0.57 Win 32 Exe x86
Threat name:
Win32.Downloader.Upatre
Status:
Suspicious
First seen:
2026-02-24 14:56:35 UTC
File Type:
PE (.Net Dll)
AV detection:
11 of 24 (45.83%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Unpacked files
SH256 hash:
0d0ca60de1f5d8df133af2387d3d503ecfdad02fc2daf1ad5ceb3d1124d24336
MD5 hash:
309c63c708c1378da092f1872627c4c6
SHA1 hash:
fa0ad6ba38f5a18e03116e1c65912a8177ec1df5
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:extracted_at_0x44b
Author:cb
Description:sample - file extracted_at_0x44b.exe
Reference:Internal Research
Rule name:Lumma_Stealer_Detection
Author:ashizZz
Description:Detects a specific Lumma Stealer malware sample using unique strings and behaviors
Reference:https://seanthegeek.net/posts/compromized-store-spread-lumma-stealer-using-fake-captcha/
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments