MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3052bd320a34e12ee694811ed0578797477dfd480c664491e509ed15ce1a6961. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



OffLoader


Vendor detections: 6


Intelligence 6 IOCs YARA 6 File information Comments

SHA256 hash: 3052bd320a34e12ee694811ed0578797477dfd480c664491e509ed15ce1a6961
SHA3-384 hash: b4ec5cc225e8f956e8aa0f558637bffc80cb5c1b7b2cf114d2fb4df64591215b5ed2d8a27b9ca039825567be7c982762
SHA1 hash: 5751f5b13bf89bbaac742ab7f071ba2327788d46
MD5 hash: 954b6a928bfecfb011f534f35a8ee415
humanhash: burger-lion-december-six
File name:Installer.exe
Download: download sample
Signature OffLoader
File size:1'806'180 bytes
First seen:2026-04-01 09:30:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 40ab50289f7ef5fae60801f88d4541fc (60 x ValleyRAT, 49 x Gh0stRAT, 42 x OffLoader)
ssdeep 24576:HawwKusHwEwSDMn6xcidUSeMITCqgcfyr4Py6K22i+i8rtVs1ZY7jQY71Z:XwREDDM4dHeMxWrP+beY7UY71Z
TLSH T1DD85CF23F2CBE03EE05E0B3B05B2A15494FB6A616522AD5796ECB4ECCF351601D3E647
TrID 50.8% (.EXE) Inno Setup installer (107240/4/30)
20.4% (.EXE) InstallShield setup (43053/19/16)
19.7% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
3.0% (.EXE) Win64 Executable (generic) (6522/11/2)
2.1% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon 5050d270cccc82ae (112 x Adware.Generic, 70 x OffLoader, 43 x LummaStealer)
Reporter aachum
Tags:dropped-by-OffLoader exe OffLoader pw-ebsqeobzwzorqapepmqadkhvxfpcwo


Avatar
iamaachum
https://watchadvance.com/Installer.exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
109
Origin country :
ES ES
Vendor Threat Intelligence
Gathering data
Malware family:
n/a
ID:
1
File name:
Installer.exe
Verdict:
No threats detected
Analysis date:
2026-04-01 08:58:04 UTC
Tags:
delphi inno installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
Verdict:
Clean
File Type:
exe x32
First seen:
2026-03-24T14:34:00Z UTC
Last seen:
2026-04-03T07:19:00Z UTC
Hits:
~100
Result
Threat name:
n/a
Detection:
clean
Classification:
n/a
Score:
4 / 100
Behaviour
Behavior Graph:
n/a
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery installer
Behaviour
Suspicious use of WriteProcessMemory
Inno Setup is an open-source installation builder for Windows applications.
System Location Discovery: System Language Discovery
Executes dropped EXE
Loads dropped DLL
Unpacked files
SH256 hash:
3052bd320a34e12ee694811ed0578797477dfd480c664491e509ed15ce1a6961
MD5 hash:
954b6a928bfecfb011f534f35a8ee415
SHA1 hash:
5751f5b13bf89bbaac742ab7f071ba2327788d46
SH256 hash:
4503b159b6dc5367a5be5a190aad0d813f3963c7f17597944c01da2ff31d747b
MD5 hash:
26b02d16ec2da83483b7fa5e004bd54f
SHA1 hash:
6b673bf5e011017034d9e03a6ae57e8b8f011b97
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:pe_detect_tls_callbacks
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Reference:https://cyfare.net/
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

OffLoader

Executable exe 3052bd320a34e12ee694811ed0578797477dfd480c664491e509ed15ce1a6961

(this sample)

  
Dropped by
OffLoader
  
Delivery method
Distributed via web download

Comments