MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 27bd90199e426719d1c3ef214215a17fae23f257d8bcb7a806e394e8666158f0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gamaredon


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 27bd90199e426719d1c3ef214215a17fae23f257d8bcb7a806e394e8666158f0
SHA3-384 hash: 91173daf926b46de04eafd63182fbf7f7f052ca7c70c3a57b3c6104604b05c3b96444d268c0fa291702806d167f3927a
SHA1 hash: 990c07fb06af6d91148c8a7a8a7938c1e30eab1c
MD5 hash: b9e2457d5d1def16a37958b29983d307
humanhash: pluto-golf-georgia-early
File name:2-3716-25_07.11.2025.hta
Download: download sample
Signature Gamaredon
File size:7'856 bytes
First seen:2025-11-07 15:31:34 UTC
Last seen:Never
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 96:baMrvL7wx2qcLetysV0vDkukvCJYEzYO+uboOPMySIkcWjJMAJ8:c0wu6CJYBuMc+JL8
TLSH T13EF1173AE4860E1F539A85EBC3D148C6CF3B8A12A2FB75123473939F44BD94C955B079
Magika html
Reporter smica83
Tags:apt gamaredon hta UKR

Intelligence


File Origin
# of uploads :
1
# of downloads :
46
Origin country :
HU HU
Vendor Threat Intelligence
Verdict:
Malicious
Score:
81.4%
Tags:
virus overt spawn
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Payload URLs
URL
File name
http://UDOpnRc.mq
HTA File
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
lolbin mshta obfuscated
Verdict:
Malicious
File Type:
hta
First seen:
2025-11-07T13:01:00Z UTC
Last seen:
2025-11-09T12:01:00Z UTC
Hits:
~100
Detections:
HEUR:Trojan.Script.Generic Trojan.Win32.Agent.sb Trojan.JS.SAgent.sb
Result
Threat name:
n/a
Detection:
clean
Classification:
n/a
Score:
3 / 100
Behaviour
Behavior Graph:
n/a
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
Html
Threat name:
Text.Trojan.Gamaredon
Status:
Malicious
First seen:
2025-11-07 15:45:49 UTC
File Type:
Text (HTML)
Extracted files:
1
AV detection:
6 of 24 (25.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Checks computer location settings
Badlisted process makes network request
Malware Config
Dropper Extraction:
https://ssu.gov.ua@app-334825a6-4a2b-48bc-be92-e0582d656006.cleverapps.io?/ss_07.11.2025/flashlightsK8Q/pondjSQ.pdf
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments