MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1942b8e87183ad52259060638ea36052cfbecdeae45c01879c0f4d22c044dca6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 12
| SHA256 hash: | 1942b8e87183ad52259060638ea36052cfbecdeae45c01879c0f4d22c044dca6 |
|---|---|
| SHA3-384 hash: | e184a1b9a9b088d5173e75a17036db178ab8a9393021ca47d13aac038b0831155773ba545743692d4af1271d3bee85d4 |
| SHA1 hash: | 00555d6d65ba015a6365c1245cabd6d90cf784aa |
| MD5 hash: | 166c6d56666f459ea9784b550631c6a0 |
| humanhash: | apart-oven-item-alanine |
| File name: | chromasj.msi |
| Download: | download sample |
| File size: | 99'096'064 bytes |
| First seen: | 2026-02-03 10:09:25 UTC |
| Last seen: | 2026-02-03 10:38:37 UTC |
| File type: | |
| MIME type: | application/x-msi |
| ssdeep | 1572864:FyGuijRz386a8wiQoxTGBXQ2xohdsQsQS0pHlxuRXFGrm/qhLInHMuKGf2b7YUkT:TP9zsZNiQoAB3u1HlYGrdIHjKi2Xha |
| Threatray | 857 similar samples on MalwareBazaar |
| TLSH | T1BC283320B96A99A5EA2FA37FE0A8DF5A40707DD03337D5EB63783F9589B058111B1D03 |
| TrID | 80.0% (.MSI) Microsoft Windows Installer (454500/1/170) 10.7% (.MST) Windows SDK Setup Transform script (61000/1/5) 7.8% (.MSP) Windows Installer Patch (44509/10/5) 1.4% (.) Generic OLE2 / Multistream Compound (8000/1) |
| Magika | msi |
| Reporter | |
| Tags: | Malgent msi Trojan:Win32/Malgent!MSR |
CNGaoLing
This sample has been reviewed by Microsoft researchers and determined to be malware. (Trojan:Win32/Malgent!MSR)Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 27.124.45.26:9090 | https://threatfox.abuse.ch/ioc/1740748/ |
Intelligence
File Origin
# of uploads :
2
# of downloads :
59
Origin country :
USVendor Threat Intelligence
Verdict:
Malicious
Score:
70%
Tags:
malware
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
anti-debug anti-vm at base64 CAB cmd evasive expired-cert expired-cert explorer fingerprint fingerprint fingerprint installer large-file lolbin packed wix
Result
Verdict:
MALICIOUS
Link:
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
File Type:
msi
First seen:
2026-02-02T22:41:00Z UTC
Last seen:
2026-02-03T07:17:00Z UTC
Hits:
~10
Detections:
Trojan.Win32.Agent.sb Trojan.Win64.Agent.smfldg HEUR:Trojan.OLE2.Agent.gen Trojan.Win64.Agent.sb Trojan.Win32.Shellcode.sb Trojan.Win32.DLLhijack.adpl Trojan.OLE2.Agent.sb Trojan.Win32.DLLhijack.sb BSS:Trojan.Win32.Generic
Score:
61%
Verdict:
Susipicious
File Type:
ARCHIVE
Gathering data
Verdict:
Malicious
Threat:
Trojan.Win64.Agent
Threat name:
Win64.Trojan.Malgent
Status:
Malicious
First seen:
2026-02-03 01:25:13 UTC
File Type:
Binary (Archive)
Extracted files:
44202
AV detection:
6 of 38 (15.79%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
donutloader
Similar samples:
+ 847 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
7/10
Tags:
discovery persistence privilege_escalation
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Event Triggered Execution: Installer Packages
System Location Discovery: System Language Discovery
Enumerates connected drives
Loads dropped DLL
Malware family:
DonutLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
msi 1942b8e87183ad52259060638ea36052cfbecdeae45c01879c0f4d22c044dca6
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.