MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2216e13de2ed490004e99ba074159c38959c4e93e145201b99408a0a8eeb391c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 2216e13de2ed490004e99ba074159c38959c4e93e145201b99408a0a8eeb391c
SHA3-384 hash: 0f2df6c7b1d5ab2a2733b957f49f0b4f50481cd7c6634372eba568c6c51ae14f00e8370111f3f9402abb8c4d5d018d22
SHA1 hash: d6c6a0d77d4bd0637ec89b1be69300d9372ec35b
MD5 hash: d5ef62ce9b699d2bff90d9b83138a46f
humanhash: pennsylvania-beer-football-bluebird
File name:libiomp5md.dll
Download: download sample
File size:102'935'024 bytes
First seen:2026-04-15 16:28:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 82c0493807f3b15a01497cf9d5f88eb8
ssdeep 24576:DHysFeU1yGv0PIqeK7crVoB6BnrHdByLl7HQcbMxAok89RFfm:7e6hAIjhvnrKplwmEne
Threatray 10 similar samples on MalwareBazaar
TLSH T166389F12A7B4C42BF90E5C3353AD129F94E7B41A7D5EA338E2894B8F0C61C6C5B86D17
TrID 33.1% (.EXE) Win64 Executable (generic) (6522/11/2)
25.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.4% (.ICL) Windows Icons Library (generic) (2059/9)
10.3% (.EXE) OS/2 Executable (generic) (2029/13)
10.1% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter JAMESWT_WT
Tags:antesdissovaidacerto-com-br banker coyote exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
580
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
_2216e13de2ed490004e99ba074159c38959c4e93e145201b99408a0a8eeb391c
Verdict:
No threats detected
Analysis date:
2026-04-15 16:34:13 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a file in the %temp% directory
Creating a file in the %AppData% subdirectories
Сreating synchronization primitives
Setting an event handler
Searching for synchronization primitives
DNS request
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug base64 bloated masquerade mingw overlay packed
Verdict:
Malicious
File Type:
dll x64
First seen:
2026-02-18T14:28:00Z UTC
Last seen:
2026-04-15T15:44:00Z UTC
Hits:
~100
Detections:
Trojan.Win32.Shellcode.sb PDM:Trojan.Win32.Generic Trojan.Win32.Shellcode.oeh
Gathering data
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2026-04-14 19:59:58 UTC
File Type:
PE+ (Dll)
AV detection:
9 of 24 (37.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments