MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1598e27a493789c6aaed8686369c4bda52be1d159afbfe3913e568116fad98b3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 6
| SHA256 hash: | 1598e27a493789c6aaed8686369c4bda52be1d159afbfe3913e568116fad98b3 |
|---|---|
| SHA3-384 hash: | e491dff186f663122cae0037b695d7c6568f9068953bc46569a20c9ef16530ff88cac459dd1c5999bef6cb743231f815 |
| SHA1 hash: | a326a0048fa5462030e92f1153c0e8ff577ab46e |
| MD5 hash: | 6bca984e2af88187d36e5787973a2437 |
| humanhash: | ceiling-london-fanta-iowa |
| File name: | Installer.exe |
| Download: | download sample |
| File size: | 82'213'888 bytes |
| First seen: | 2026-02-01 13:24:29 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 8062a445f5cd940b5daefb09f80bc2a2 (2 x ScarfaceStealer, 1 x RevStealer) |
| ssdeep | 393216:Y9UZyW0PYsIUmgB9S7QJrojJgVXIXT9fN3aoIKF1H5XMutmnnY4nZFUT7HihCLJ+:YJX3mcLmSh81vxOtxth |
| TLSH | T110087C42A3EA05D5F9F79A3489E65213D673BC063B3082DF325C172A1F736E08976B61 |
| TrID | 48.7% (.EXE) Win64 Executable (generic) (10522/11/4) 23.3% (.EXE) Win16 NE executable (generic) (5038/12/1) 9.3% (.EXE) OS/2 Executable (generic) (2029/13) 9.2% (.EXE) Generic Win/DOS Executable (2002/3) 9.2% (.EXE) DOS Executable Generic (2000/1) |
| Magika | pebin |
| dhash icon | 1771e8cccce9b2ec |
| Reporter | |
| Tags: | exe |
lfr
https://hardware-gui.su/https://c10.patreonusercontent.com/4/patreon-media/p/post/149654962/1497f4f111fe4f7190ca1b820c034fd8/eyJhIjoxLCJwIjoxfQ==/1.zip?token-hash=HQN5m5gt27IT54xIy2ggY8zo_u_KTNAhnkDei955sjM=&token-time=1770249600
Intelligence
File Origin
# of uploads :
1
# of downloads :
1'797
Origin country :
FRVendor Threat Intelligence
Gathering data
Malware family:
n/a
ID:
1
File name:
Installer.exe
Verdict:
Suspicious activity
Analysis date:
2026-02-01 13:25:10 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Clean
Score:
99.9%
Tags:
n/a
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm crypto expand fingerprint lolbin microsoft_visual_cc
Verdict:
Suspicious
Labled as:
Malware_54.3
Verdict:
Clean
File Type:
exe x64
First seen:
2026-02-01T10:15:00Z UTC
Last seen:
2026-02-01T10:22:00Z UTC
Hits:
~10
Score:
0%
Verdict:
Benign
File Type:
PE
Gathering data
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2026-02-01 13:25:21 UTC
File Type:
PE+ (Exe)
Extracted files:
8
AV detection:
9 of 24 (37.50%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
6/10
Tags:
defense_evasion discovery
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates processes with tasklist
Obfuscated Files or Information: Command Obfuscation
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
exe 1598e27a493789c6aaed8686369c4bda52be1d159afbfe3913e568116fad98b3
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.