MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2dec3beb719469f3f93e0c322f5d119347f0fb52e9f33495a16d5e9f6664b749. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkTortilla


Vendor detections: 11


Intelligence 11 IOCs YARA 4 File information Comments

SHA256 hash: 2dec3beb719469f3f93e0c322f5d119347f0fb52e9f33495a16d5e9f6664b749
SHA3-384 hash: e00ba88f9652b9756147a7bbe1733febd364990b96f7320bec6e4a08ded86a2079e135079006fb09a3e14b56b9c275ce
SHA1 hash: 6c224f3c45de4eff7d572c3f30534da96ae65873
MD5 hash: 5e5c05503dda922fc0aea0b829ce2fd4
humanhash: jupiter-arkansas-orange-washington
File name:mass4.pdf.lnk
Download: download sample
Signature DarkTortilla
File size:3'000 bytes
First seen:2025-12-11 13:56:47 UTC
Last seen:Never
File type:Shortcut (lnk) lnk
MIME type:application/x-ms-shortcut
ssdeep 24:8Ayw/BHYVKVWO+/CWjNSAt2VFv7kaHqaj5CChtnwmddd79dsrab7Z:8y5afNf2V9AaKaj5CCh1wmddJ9AaZ
TLSH T17F5189101EF21258F276873257FAB3A28867B814DD3847AD004C86441733681E4F6F3B
Magika lnk
Reporter abuse_ch
Tags:DarkTortilla lnk

Intelligence


File Origin
# of uploads :
1
# of downloads :
79
Origin country :
SE SE
Vendor Threat Intelligence
Malware configuration found for:
LNK
Details
LNK
a command line and any observed urls
Verdict:
Malicious
Score:
99.9%
Tags:
autorun xtreme shell virus
Result
Verdict:
Malicious
File Type:
LNK File - Malicious
Behaviour
BlacklistAPI detected
Verdict:
Malicious
File Type:
lnk
First seen:
2025-12-10T16:22:00Z UTC
Last seen:
2025-12-12T10:41:00Z UTC
Hits:
~100
Detections:
HEUR:Trojan.WinLNK.Powecod.a HEUR:Trojan.WinLNK.Agent.gen HEUR:Trojan.Multi.Powedon.b HEUR:Trojan.Multi.Powecod.gen HEUR:Trojan.Multi.GenBadur.genw PDM:Trojan.Win32.Generic Trojan.WinLNK.Agent.sb HEUR:Trojan.WinLNK.ZDI-CAN-25373.gen
Result
Threat name:
DarkTortilla
Detection:
malicious
Classification:
troj.adwa.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Antivirus detection for URL or domain
Drops PE files to the startup folder
Encrypted powershell cmdline option found
Hides that the sample has been downloaded from the Internet (zone.identifier)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Powershell drops PE file
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Suricata IDS alerts for network traffic
Uses an obfuscated file name to hide its real file extension (double extension)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Windows shortcut file (LNK) starts blacklisted processes
Yara detected AntiVM3
Yara detected DarkTortilla Crypter
Yara detected LNK With Padded Argument
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1830946 Sample: mass4.pdf.lnk Startdate: 11/12/2025 Architecture: WINDOWS Score: 100 50 caltille.com 2->50 52 x1.i.lencr.org 2->52 54 3 other IPs or domains 2->54 60 Suricata IDS alerts for network traffic 2->60 62 Antivirus detection for URL or domain 2->62 64 Windows shortcut file (LNK) starts blacklisted processes 2->64 66 13 other signatures 2->66 10 powershell.exe 14 30 2->10         started        14 Goodyear_Logistics_Broker_Carrier_Transportation_Agreement_22.exe 2->14         started        signatures3 process4 dnsIp5 56 caltille.com 66.29.132.150, 443, 49691, 49692 ADVANTAGECOMUS United States 10->56 74 Windows shortcut file (LNK) starts blacklisted processes 10->74 76 Encrypted powershell cmdline option found 10->76 78 Loading BitLocker PowerShell Module 10->78 80 Powershell drops PE file 10->80 16 powershell.exe 3 18 10->16         started        19 conhost.exe 1 10->19         started        82 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->82 signatures6 process7 file8 42 C:\Users\user\AppData\Roaming\1.exe, PE32 16->42 dropped 21 1.exe 16->21         started        24 Acrobat.exe 61 16->24         started        process9 signatures10 68 Windows shortcut file (LNK) starts blacklisted processes 21->68 70 Multi AV Scanner detection for dropped file 21->70 72 Hides that the sample has been downloaded from the Internet (zone.identifier) 21->72 26 cmd.exe 21->26         started        30 AcroCEF.exe 92 24->30         started        process11 dnsIp12 44 Goodyear_Logistics...on_Agreement_22.exe, PE32 26->44 dropped 84 Uses ping.exe to sleep 26->84 86 Drops PE files to the startup folder 26->86 88 Uses ping.exe to check the status of other devices and networks 26->88 33 PING.EXE 26->33         started        36 conhost.exe 26->36         started        38 PING.EXE 26->38         started        58 e8652.dscx.akamaiedge.net 23.37.205.126, 49703, 80 FASTNET-AS-IDLinknet-FastnetASNID United States 30->58 40 AcroCEF.exe 30->40         started        file13 signatures14 process15 dnsIp16 46 127.0.0.1 unknown unknown 33->46 48 184.30.252.185, 443, 49704 AKAMAI-ASUS United States 40->48
Verdict:
Malware
YARA:
2 match(es)
Tags:
Batch Command Execution: CMD in LNK Execution: PowerShell in LNK LNK LOLBin LOLBin:powershell.exe Malicious PowerShell PowerShell Call T1059.001 T1059.003 T1202: Indirect Command Execution T1204.002
Threat name:
Shortcut.Trojan.Boxter
Status:
Malicious
First seen:
2025-12-10 19:24:23 UTC
File Type:
Binary
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
adware discovery spyware
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Drops file in Windows directory
.NET Reactor proctector
Checks computer location settings
Drops startup file
Executes dropped EXE
Badlisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:EXT_EXPL_ZTH_LNK_EXPLOIT_A
Author:Peter Girnus
Description:This YARA file detects padded LNK files designed to exploit ZDI-CAN-25373.
Reference:https://www.trendmicro.com/en_us/research/25/c/windows-shortcut-zero-day-exploit.html
Rule name:PS_in_LNK
Author:@bartblaze
Description:Identifies PowerShell artefacts in shortcut (LNK) files.
Rule name:SUSP_LNK_PowerShell
Author:SECUINFRA Falcon Team
Description:Detects the reference to powershell inside an lnk file, which is suspicious
Rule name:SUSP_PS1_JAB_Pattern_Jun22_1
Author:Florian Roth (Nextron Systems)
Description:Detects suspicious UTF16 and Base64 encoded PowerShell code that starts with a $ sign and a single char variable
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DarkTortilla

Shortcut (lnk) lnk 2dec3beb719469f3f93e0c322f5d119347f0fb52e9f33495a16d5e9f6664b749

(this sample)

  
Delivery method
Distributed via web download

Comments