MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 29a20739af963eba094778ea5038e7ab812fb687a852a9d94e290d6997ccde10. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 18 File information Comments

SHA256 hash: 29a20739af963eba094778ea5038e7ab812fb687a852a9d94e290d6997ccde10
SHA3-384 hash: 0a1a9741f0fbfda47bfe922edf8db7c102de4c785ccf2def0f359f63dcacf381734cf1631654268d6191d74c49fd5a25
SHA1 hash: c3c3294bcadf03be23ea7a33f47dd279a2e54cfd
MD5 hash: 0112083f2976f483fc50c9dba8c0434b
humanhash: arizona-wisconsin-beryllium-music
File name:PSBBmYYA.exe
Download: download sample
File size:4'947'740 bytes
First seen:2026-01-30 09:47:41 UTC
Last seen:2026-01-30 10:43:30 UTC
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 49152:dX8sk53zp0/8Iro9EWFkorsuvsa5NxrgalEfJs4XcjhnvHa3IGhgPYd394SYSF9:dqZCfJs4X2hfa3IGTd394SY49
TLSH T1B8364B63ADB491E8C0AFF0789861F152E660784843353AD75FD04BE10F6BBC552BBB1A
TrID 44.4% (.EXE) Win64 Executable (generic) (10522/11/4)
21.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.ICL) Windows Icons Library (generic) (2059/9)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
120
Origin country :
SE SE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
70%
Tags:
injection
Result
Verdict:
Malware
Maliciousness:
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Gathering data
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Unpacked files
SH256 hash:
29a20739af963eba094778ea5038e7ab812fb687a852a9d94e290d6997ccde10
MD5 hash:
0112083f2976f483fc50c9dba8c0434b
SHA1 hash:
c3c3294bcadf03be23ea7a33f47dd279a2e54cfd
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:dependsonpythonailib
Author:Tim Brown
Description:Hunts for dependencies on Python AI libraries
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:DetectGoMethodSignatures
Author:Wyatt Tauber
Description:Detects Go method signatures in unpacked Go binaries
Rule name:GoBinTest
Rule name:golang
Rule name:Golangmalware
Author:Dhanunjaya
Description:Malware in Golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:golang_duffcopy_amd64
Rule name:Golang_Find_CSC846
Author:Ashar Siddiqui
Description:Find Go Signatuers
Rule name:Golang_Find_CSC846_Simple
Author:Ashar Siddiqui
Description:Find Go Signatuers
Rule name:HiveRansomware
Author:Dhanunjaya
Description:Yara Rule To Detect Hive V4 Ransomware
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:ProgramLanguage_Golang
Author:albertzsigovits
Description:Application written in Golang programming language
Rule name:Suspicious_Golang_Binary
Author:Tim Machac
Description:Triage: Golang-compiled binary with suspicious OS/persistence/network strings (not family-specific)
Rule name:telebot_framework
Author:vietdx.mb

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 29a20739af963eba094778ea5038e7ab812fb687a852a9d94e290d6997ccde10

(this sample)

  
Delivery method
Distributed via web download

Comments