MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 251ae8ada8f8224a371ca01a32b1f3cddcc143b800da3be065b88422097ccb93. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 12 File information Comments

SHA256 hash: 251ae8ada8f8224a371ca01a32b1f3cddcc143b800da3be065b88422097ccb93
SHA3-384 hash: 7a5806af94758c970ac3031d95a17f7decb37d48d5b3d7b7f11d58c28dee7d199500d08ad01e707f39ec6f0fdbfb653b
SHA1 hash: 291d0d287a442d3c84d4d6313312c0f4668529f0
MD5 hash: 9c40b2bfc2b7cfa85c773fa202c48676
humanhash: fanta-connecticut-uniform-green
File name:251ae8ada8f8224a371ca01a32b1f3cddcc143b800da3be065b88422097ccb93.zip
Download: download sample
File size:9'563'408 bytes
First seen:2026-02-27 06:54:28 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 196608:bL3SszDzHjUOVwriMw9PZ2AcweS6ARWh5Qy6oX/xOo6:bL3SGrjpVsiMePZn2WRWvtB/wn
TLSH T145A633AFF253CBEA8444ADE247F403650EC74EE5F56BC47B0AAD017A19C708A9CB1749
Magika zip
Reporter JAMESWT_WT
Tags:212-227-65-132 zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
49
Origin country :
IT IT
File Archive Information

This file archive contains 2 file(s), sorted by their relevance:

File name:Token Checker.exe
File size:9'753'166 bytes
SHA256 hash: 90f2b095eb3b4dd8b484cc50a3501601891d242e715cdc88bc1def44ef891fd5
MD5 hash: ff857a4ffa89caa81ab1312732669da4
MIME type:application/x-dosexec
File name:tokens.txt
File size:81 bytes
SHA256 hash: 102907a790677e5900abf2c0f05d94c5dd1c30a7d0b11c466986728b8224d8af
MD5 hash: 73f55d10adb43c0e422fa74d4e7d0ed9
MIME type:text/plain
Vendor Threat Intelligence
Verdict:
Malicious
Score:
81.4%
Tags:
installer injection obfusc
Result
Verdict:
Malicious
File Type:
PE File
Behaviour
SuspiciousEmbeddedObjects detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
expand lolbin microsoft_visual_cc overlay packed packed pyinstaller unsafe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Zip Archive
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2024-08-16 02:30:36 UTC
AV detection:
10 of 38 (26.32%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
pyinstaller
Behaviour
Suspicious use of WriteProcessMemory
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Detect_PyInstaller
Author:Obscurity Labs LLC
Description:Detects PyInstaller compiled executables across platforms
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:PyInstaller
Author:@bartblaze
Description:Identifies executable converted using PyInstaller. This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments