MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 270c3b05a1bf1569ec6d2c60cd9c0ac5e6f121c666a00c29e1ff477a6240f8d5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 270c3b05a1bf1569ec6d2c60cd9c0ac5e6f121c666a00c29e1ff477a6240f8d5
SHA3-384 hash: 122cc9346c5066ab6c976169feac0c6fd64a1fa59febd9da959ab80f5e66f238f4426bd179a6fa8ff0c8763b4202626a
SHA1 hash: f69e5d422e41697b121fbcd56d227f965643e0b6
MD5 hash: 50a5287d835e607309931a958cf455dd
humanhash: lemon-georgia-beer-connecticut
File name:2-1180-25_03.06.2025.HTA
Download: download sample
File size:3'549 bytes
First seen:2025-06-05 15:34:02 UTC
Last seen:Never
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 96:bfAMHbGnXCFL+mWLNjWLjtt+fhaPro6e6T6t6s62F6o6P67d9qN8Z9SzY46:BbGnSc5a/tt+hgo6e6T6t6s626o6P675
TLSH T19F71791938A61DDAA1D9D46FB0CA320B25C8A11738B6808D770727553F30BB4697FCFA
Magika vba
Reporter abuse_ch
Tags:hta

Intelligence


File Origin
# of uploads :
1
# of downloads :
39
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
70%
Tags:
virus spawn sage
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Payload URLs
URL
File name
https://speedyy7O.com
HTA File
Behaviour
BlacklistAPI detected
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Document-HTML.Trojan.Gamaredon
Status:
Malicious
First seen:
2025-06-04 18:19:22 UTC
File Type:
Text (HTML)
Extracted files:
1
AV detection:
3 of 38 (7.89%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Checks computer location settings
Blocklisted process makes network request
Malware Config
Dropper Extraction:
https://libraries-thus-yale-collaborative.trycloudflare.com/Gost/pitchedcbY/intenseLkt.jpeg
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments