MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3117ee3f64f78f3ca8de5d5299947ca34e2f2fb8302627b1dc8f7ac23b046fc1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnappyClient


Vendor detections: 15


Intelligence 15 IOCs YARA 6 File information Comments

SHA256 hash: 3117ee3f64f78f3ca8de5d5299947ca34e2f2fb8302627b1dc8f7ac23b046fc1
SHA3-384 hash: b0072890dce98bea51682b9714dc524dae202387d138c63fedeca2671e8984000d976ac655d91b11bb55c049550dd9b6
SHA1 hash: d48ef109b10097c2fe584c143915d618e4999f67
MD5 hash: 402b6333d6725eaeb66bb61add432909
humanhash: sweet-papa-lamp-lion
File name:3117ee3f64f78f3ca8de5d5299947ca34e2f2fb8302627b1dc8f7ac23b046fc1
Download: download sample
Signature SnappyClient
File size:6'746'426 bytes
First seen:2026-04-14 18:22:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d7e2fd259780271687ffca462b9e69b7 (6 x AsyncRAT, 6 x LummaStealer, 6 x AurotunStealer)
ssdeep 196608:sfUE9PzeYV5Qzi+3QEztXe4WddsDodfkcUSng3HM4:8XR7QzL3QMuZ84fkYng3Z
TLSH T140662332E5910022E2F2067BBD28A5303D6CF338176589B9D3D5E94D3AB84D66BF3257
TrID 22.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
22.7% (.EXE) Win64 Executable (generic) (6522/11/2)
17.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
15.7% (.EXE) Win32 Executable (generic) (4504/4/1)
7.0% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
dhash icon b2e1b496a6cada72 (13 x LummaStealer, 13 x AsyncRAT, 11 x HijackLoader)
Reporter JAMESWT_WT
Tags:195-177-94-94 exe SnappyClient

Intelligence


File Origin
# of uploads :
1
# of downloads :
169
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
IIMBVCXU.exe
Verdict:
Malicious activity
Analysis date:
2026-04-03 00:44:55 UTC
Tags:
hijackloader loader stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.1%
Tags:
injection dropper smtp
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the Windows subdirectories
Creating a process from a recently created file
Creating a file in the %temp% directory
Creating a window
Creating a file
Gathering data
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-02-25T01:07:00Z UTC
Last seen:
2026-04-15T08:37:00Z UTC
Hits:
~100
Detections:
Trojan.Win64.DLLhijack.cne Trojan.Win32.Strab.sb Trojan.Win32.Penguish.sb Trojan.Win32.Penguish.gpz Trojan.Win32.Inject.sb Trojan-PSW.Win32.Stealer.sb Trojan-PSW.Win32.Pycoon.sb Trojan-Dropper.Win32.Injector.sb Trojan.Win32.Zenpak.sb Trojan.Win32.Penguish.gqa
Gathering data
Threat name:
Win32.Trojan.Hijackloader
Status:
Malicious
First seen:
2026-02-25 05:16:57 UTC
File Type:
PE (Exe)
Extracted files:
572
AV detection:
21 of 36 (58.33%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
hijackloader
Similar samples:
Result
Malware family:
snappyclient
Score:
  10/10
Tags:
family:hijackloader family:snappyclient backdoor discovery loader stealer
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Suspicious use of SetThreadContext
Executes dropped EXE
Loads dropped DLL
Detects HijackLoader (aka IDAT Loader)
Family: HijackLoader, IDAT loader, Ghostulse,
Family: SnappyClient
Unpacked files
SH256 hash:
3117ee3f64f78f3ca8de5d5299947ca34e2f2fb8302627b1dc8f7ac23b046fc1
MD5 hash:
402b6333d6725eaeb66bb61add432909
SHA1 hash:
d48ef109b10097c2fe584c143915d618e4999f67
SH256 hash:
b6a21a3decc2d330941cb145ada9db786e1b46692f34495398ed10bcbd8030c7
MD5 hash:
45f68ebae45ce5bb68bb4f7c19e3e4ed
SHA1 hash:
fee2bcd188d803295c4e500b7dda83c6f4657208
SH256 hash:
125b6dfc205255e657f178bb61c6d6b75fa842fce11b5a1df3ccd9b21147603d
MD5 hash:
c0f4deeff1cf640afefbf7e341f216b6
SHA1 hash:
276bea6fcf9250df50ec7bc945283da6072c871f
SH256 hash:
2657d992e0b50d6114e2fcdd375e041b70c0639ccd358ec325516eedde952925
MD5 hash:
8d5f8a274eddb267aa99bbef48a8b5a3
SHA1 hash:
793c6fd03745abc927b4e39e60eff357db5f61d9
Malware family:
GHOSTPULSE
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Reference:https://cyfare.net/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments