MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 19b2d144baa5343de7ffad9d60724b7af4dc612e2e456c7a85382adfb4f24e54. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Chaos


Vendor detections: 15


Intelligence 15 IOCs YARA 43 File information Comments

SHA256 hash: 19b2d144baa5343de7ffad9d60724b7af4dc612e2e456c7a85382adfb4f24e54
SHA3-384 hash: 8852b12f2ebe63395fa73f51283f23222323eab120d55145cf9adc60422b3828b4cb5a3aa4528d055e927c8658fb8d08
SHA1 hash: 083294c3be15f842cbda9a257cfd2044fee49659
MD5 hash: 2d388d225963fa20a6a87850eb9f8f35
humanhash: cola-asparagus-bravo-berlin
File name:win.exe
Download: download sample
Signature Chaos
File size:1'923'584 bytes
First seen:2025-09-29 14:16:14 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6ed4f5f04d62b18d96b26d6db7c18840 (321 x SalatStealer, 78 x BitRAT, 42 x RedLineStealer)
ssdeep 49152:ZnPeYWTOOsh7iWlcJrnunnJpMD5A4ywIIyIyNIikx:ZnDCa+WlcJ0gt7yNt
TLSH T18095334FAD16DE42D86FFE3A6C7F2B1674D375C2EC2A14BB42BD81892931E21A445206
TrID 32.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
28.9% (.EXE) Win32 Executable (generic) (4504/4/1)
13.0% (.EXE) OS/2 Executable (generic) (2029/13)
12.8% (.EXE) Generic Win/DOS Executable (2002/3)
12.8% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:Chaos exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
96
Origin country :
SE SE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
win.exe
Verdict:
No threats detected
Analysis date:
2025-09-28 14:28:57 UTC
Tags:
auto-reg upx golang

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a file
DNS request
Connection attempt
Launching a process
Creating a window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed packed packed packer_detected threat upx
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-09-27T19:54:00Z UTC
Last seen:
2025-09-27T19:54:00Z UTC
Hits:
~100
Detections:
Trojan.Win32.Chaos.ompg PDM:Trojan.Win32.Generic Backdoor.Agent.HTTP.C&C Trojan-Downloader.Win32.Gomal.sb Trojan.Win32.Chaos.sb Trojan.Win32.Agent.sb
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
92 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Drops PE files with benign system names
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
Yara detected Chaos
Behaviour
Behavior Graph:
Gathering data
Threat name:
Win32.Trojan.Egairtigado
Status:
Malicious
First seen:
2025-09-28 00:38:07 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
31 of 38 (81.58%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery persistence upx
Behaviour
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
UPX packed file
Adds Run key to start application
Executes dropped EXE
Verdict:
Malicious
Tags:
trojan Win.Malware.Lazy-9976626-0
YARA:
SUSP_Imphash_Mar23_3
Unpacked files
SH256 hash:
19b2d144baa5343de7ffad9d60724b7af4dc612e2e456c7a85382adfb4f24e54
MD5 hash:
2d388d225963fa20a6a87850eb9f8f35
SHA1 hash:
083294c3be15f842cbda9a257cfd2044fee49659
SH256 hash:
d7dc12acf8b854149d4456fd5d6f71ca4273ec643da9e009c68f48a346ff120a
MD5 hash:
5992ee29c5b14c479ee7a5e63edc1468
SHA1 hash:
832747119eaaa03b594ce36416e9e7c530077365
Detections:
INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
SH256 hash:
839bfd5ece688c7dcf1a9dffc724d0d786988ce04f5b3a17c464fa5b3916b307
MD5 hash:
0d6b7d30ced39710ff5743ecda684b6c
SHA1 hash:
e685b9e66f10cd9ccf89cec5588b5615dc33ad4d
Detections:
INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:botnet_plaintext_c2
Author:cip
Description:Attempts to match at least some of the strings used in some botnet variants which use plaintext communication protocols.
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__ConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:DetectGoMethodSignatures
Author:Wyatt Tauber
Description:Detects Go method signatures in unpacked Go binaries
Rule name:Detect_Go_GOMAXPROCS
Author:Obscurity Labs LLC
Description:Detects Go binaries by the presence of runtime.GOMAXPROCS in the runtime metadata
Rule name:GoBinTest
Rule name:golang
Rule name:Golangmalware
Author:Dhanunjaya
Description:Malware in Golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:HiveRansomware
Author:Dhanunjaya
Description:Yara Rule To Detect Hive V4 Ransomware
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:Linux_Generic_Threat_a40aaa96
Author:Elastic Security
Rule name:Linux_Trojan_Kaiji_91091be3
Author:Elastic Security
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:ProgramLanguage_Golang
Author:albertzsigovits
Description:Application written in Golang programming language
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:SUSP_Imphash_Mar23_3
Author:Arnim Rupp (https://github.com/ruppde)
Description:Detects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits
Reference:Internal Research
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Chaos

Executable exe 19b2d144baa5343de7ffad9d60724b7af4dc612e2e456c7a85382adfb4f24e54

(this sample)

  
Delivery method
Distributed via web download

Comments