MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 23307d951e7b261de6f79fed166064565aaabe9d89d8de79e58207e0a329a85b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 23307d951e7b261de6f79fed166064565aaabe9d89d8de79e58207e0a329a85b
SHA3-384 hash: 4681bd16628a8e1dfb44174981f5fdf3cca0499ec9b43f34e6ee20b015b326c4d6e754dc74735be2a4f6f562d1de7103
SHA1 hash: 2c0e99d893183acae91fc93211bf8a6d8f83f977
MD5 hash: c7da61f39b51ba3686aeff87effd9aa6
humanhash: orange-coffee-charlie-wolfram
File name:Fluent.exe
Download: download sample
File size:13'104'640 bytes
First seen:2026-02-02 18:50:22 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 8739de86cd836ae1476705562c069cc0
ssdeep 393216:01nMHI8GPzv7z36Byky4NKZkG6zlX21kieSLj/J12X2f:0qobzv7z36BSkGAlm+5cIk
TLSH T17BD623E955D5A3E8D5D34A00728A43D971D1216D82EE8C1D76DA3C023B21CBF624EEFB
TrID 56.5% (.EXE) Win64 Executable (generic) (10522/11/4)
11.0% (.ICL) Windows Icons Library (generic) (2059/9)
10.9% (.EXE) OS/2 Executable (generic) (2029/13)
10.7% (.EXE) Generic Win/DOS Executable (2002/3)
10.7% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter burger
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
115
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Fluent.exe
Verdict:
No threats detected
Analysis date:
2026-02-02 18:46:53 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
installer-heuristic packed
Verdict:
Clean
File Type:
exe x64
First seen:
2026-02-02T15:46:00Z UTC
Last seen:
2026-02-02T15:58:00Z UTC
Hits:
~10
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
64 / 100
Signature
Found direct / indirect Syscall (likely to bypass EDR)
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Behaviour
Behavior Graph:
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2026-02-02 18:49:00 UTC
File Type:
PE+ (Exe)
Extracted files:
7
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Unpacked files
SH256 hash:
23307d951e7b261de6f79fed166064565aaabe9d89d8de79e58207e0a329a85b
MD5 hash:
c7da61f39b51ba3686aeff87effd9aa6
SHA1 hash:
2c0e99d893183acae91fc93211bf8a6d8f83f977
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments