MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 14118a6070f89baafd5f2aeaf2df7535a8053f99944453584f0d1efeb6501ac3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



WeedHack


Vendor detections: 15


Intelligence 15 IOCs YARA 5 File information Comments

SHA256 hash: 14118a6070f89baafd5f2aeaf2df7535a8053f99944453584f0d1efeb6501ac3
SHA3-384 hash: 69377ac54a058f3a4911bd80c4ec8c9fb5808b1825462da7f0ebbb6ee80731337017e7f87e0b0ff857b12822d2b2bb3b
SHA1 hash: 984176e90d1358ae9bd5147de4357db2110f6e4e
MD5 hash: d10a619145bfd62a5f65584b4cbcd033
humanhash: green-avocado-spaghetti-nitrogen
File name:Pjibf.exe
Download: download sample
Signature WeedHack
File size:396'288 bytes
First seen:2026-04-15 16:59:18 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'935 x AgentTesla, 19'826 x Formbook, 12'310 x SnakeKeylogger)
ssdeep 12288:N7UIuQDloSZh93j+6lwxzr/W11xFVc6By:2IxoQhtj+mazr/Ixzc6
TLSH T17284E0433AC45B12C1A44979D4F764300BE3F087B6BBD7492E99578A1E127FD8E4AF88
TrID 70.4% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.2% (.EXE) Win64 Executable (generic) (6522/11/2)
4.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter burger
Tags:exe PureHVNC WeedHack

Intelligence


File Origin
# of uploads :
1
# of downloads :
146
Origin country :
US US
Vendor Threat Intelligence
Malware configuration found for:
NETReactor
Details
NETReactor
decrypted strings
Malware family:
n/a
ID:
1
File name:
HerosAnchorOptimizer-1.1.41.jar
Verdict:
Malicious activity
Analysis date:
2026-04-15 00:32:28 UTC
Tags:
etherhiding anti-evasion stealer auto-sch weedhack auto-reg pua adware auto rustystealer loader antivm websocket

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
obfuscate xtreme shell
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a file in the %AppData% subdirectories
Сreating synchronization primitives
Launching a process
Using the Windows Management Instrumentation requests
Sending a custom TCP request
DNS request
Connection attempt
Creating a window
Setting a keyboard event handler
Creating a file in the %AppData% directory
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 bladabindi net_reactor obfuscated packed packed
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-04-14T20:24:00Z UTC
Last seen:
2026-04-17T13:54:00Z UTC
Hits:
~100
Detections:
VHO:Trojan-PSW.Win32.Stealer.gen Trojan-PSW.Win32.Stealer.sb Trojan-PSW.Win32.Coins.sb HEUR:Trojan.Win32.Generic VHO:Trojan.MSIL.Crypt.gen HEUR:Trojan-PSW.Win32.Stealer.gen
Result
Threat name:
ResolverRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Bypasses PowerShell execution policy
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Suricata IDS alerts for network traffic
Tries to harvest and steal Bitcoin Wallet information
Yara detected MSIL Injector
Yara detected ResolverRAT
Behaviour
Behavior Graph:
Gathering data
Threat name:
Win32.Backdoor.NjRAT
Status:
Malicious
First seen:
2026-04-15 05:51:37 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
23 of 38 (60.53%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery execution spyware stealer
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
System Location Discovery: System Language Discovery
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
14118a6070f89baafd5f2aeaf2df7535a8053f99944453584f0d1efeb6501ac3
MD5 hash:
d10a619145bfd62a5f65584b4cbcd033
SHA1 hash:
984176e90d1358ae9bd5147de4357db2110f6e4e
SH256 hash:
c18d85a8fc2766ab7cc61c4462d1afd8f9ecfa860fa8e6c7fcd9f54ed02b69c1
MD5 hash:
b9f581813b829369a696c8b1f6e0e366
SHA1 hash:
2eb8fe8d3f19632a34e70f38676c8b246fca220e
SH256 hash:
49d6dd92710a823afd0cd266e7e9a9226b1a5c33909a1bb396cbfa90bd4babb9
MD5 hash:
6b358971a0751b2227be1661e4f935a8
SHA1 hash:
97c19e56140df3873b69b59f2c59aa78af131b44
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
b2a66e9864f81c2800a5afef4bfd1faf7c910e5a43ea2eb9dbb15c8ab6ffc633
MD5 hash:
f0a13fb422cdb1f3ce667df897b5045b
SHA1 hash:
9b6566603e3a292482788924a83a1d94a9cd4627
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

WeedHack

Executable exe 14118a6070f89baafd5f2aeaf2df7535a8053f99944453584f0d1efeb6501ac3

(this sample)

Comments