MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3218d686f3a0ba0023a7fa4bbe6de07e2b1c470d16473c09b62429c748a15f71. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RONINGLOADER


Vendor detections: 16


Intelligence 16 IOCs YARA 15 File information Comments

SHA256 hash: 3218d686f3a0ba0023a7fa4bbe6de07e2b1c470d16473c09b62429c748a15f71
SHA3-384 hash: 3fa5cff797547ab163fb83c5a07ad0347e11e898c6579efa34041759e2a85461df4755b42d5c8cb605375e988f0d0768
SHA1 hash: 6e1e9c7116c42b44416bad21836221e838460e97
MD5 hash: 2ed6cdd9fc98fb1158a20e6c979ac3f0
humanhash: moon-leopard-bluebird-robin
File name:Snoiekshiezioty_1.exe
Download: download sample
Signature RONINGLOADER
File size:85'332'635 bytes
First seen:2025-12-23 14:40:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 46ce5c12b293febbeb513b196aa7f843 (14 x GuLoader, 6 x RemcosRAT, 5 x VIPKeylogger)
ssdeep 1572864:9rJSBE6eSbIwck3oo9SU6KurqlzB4mAhL03iWnJwcHreXw/oUZ2V:9rJonCk3tSWumicznJw0eXw/oUEV
Threatray 47 similar samples on MalwareBazaar
TLSH T15F18334C16A92D4FE5127E30FDD4BF160B845CA56AFDE543870CF9B2B181AC4B6C682E
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10522/11/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter smica83
Tags:exe RONINGLOADER

Intelligence


File Origin
# of uploads :
1
# of downloads :
95
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Snoiekshiezioty_1.exe
Verdict:
Malicious activity
Analysis date:
2025-12-23 14:42:25 UTC
Tags:
roning loader anti-evasion inno installer delphi

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
emotet cobalt
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
adaptive-context anti-debug anti-vm blackhole fingerprint fingerprint installer installer installer-heuristic microsoft_visual_cc nsis overlay packed
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-12-22T23:35:00Z UTC
Last seen:
2025-12-23T20:22:00Z UTC
Hits:
~100
Detections:
Trojan.DLLhijack.TCP.ServerRequest Trojan.Win32.Agent.sb Trojan-PSW.MSIL.Stealer.sb Trojan-Dropper.Win32.Batut.sb Trojan.Win32.PoolInject.sba Trojan.Win32.DLLhijack.acow Trojan.Win32.Arkmblk.abm
Result
Threat name:
KeyLogger
Detection:
malicious
Classification:
spre.spyw.evad
Score:
76 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Benign windows process drops PE files
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Drops large PE files
Found driver which could be used to inject code into processes
Found evasive API chain checking for user administrative privileges
Infects executable files (exe, dll, sys, html)
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample is not signed and drops a device driver
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Suricata IDS alerts for network traffic
Tries to access browser extension known for cryptocurrency wallets
Unusual module load detection (module proxying)
Writes to foreign memory regions
Yara detected Keylogger Generic
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1838265 Sample: Snoiekshiezioty_1.exe Startdate: 23/12/2025 Architecture: WINDOWS Score: 76 95 www.wshifen.com 2->95 97 www.baidu.com 2->97 99 3 other IPs or domains 2->99 123 Suricata IDS alerts for network traffic 2->123 125 Antivirus detection for dropped file 2->125 127 Multi AV Scanner detection for dropped file 2->127 129 8 other signatures 2->129 9 Snoiekshiezioty_1.exe 2 27 2->9         started        12 regsvr32.exe 1 2->12         started        signatures3 process4 file5 75 C:\Users\user\...\nsis_tauri_utils.dll, PE32 9->75 dropped 77 C:\Users\user\AppData\Local\...\System.dll, PE32 9->77 dropped 79 C:\Program Files\...\oP6MiopZ.exe, PE32+ 9->79 dropped 81 2 other malicious files 9->81 dropped 15 oP6MiopZ.exe 3 20 9->15         started        20 S2SzqO.exe 2 9->20         started        147 Writes to foreign memory regions 12->147 149 Allocates memory in foreign processes 12->149 151 Creates a thread in another existing process (thread injection) 12->151 22 elevation_service.exe 1 12->22         started        24 cmd.exe 1 12->24         started        signatures6 process7 dnsIp8 109 www.wshifen.com 103.235.46.115, 49724, 80 BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtd Hong Kong 15->109 111 127.0.0.1 unknown unknown 15->111 59 C:\Users\user\AppData\Local\...\vmservice.sys, PE32+ 15->59 dropped 61 C:\Users\user\AppData\Local\...\vally3dka.sys, PE32+ 15->61 dropped 63 C:\Users\user\AppData\Local\...\MiniFilterDrv, PE32+ 15->63 dropped 67 4 other malicious files 15->67 dropped 113 Writes to foreign memory regions 15->113 115 Allocates memory in foreign processes 15->115 117 Sample is not signed and drops a device driver 15->117 26 svchost.exe 3 1 15->26 injected 30 ClipUp.exe 1 15->30         started        32 cmd.exe 2 15->32         started        65 C:\Users\user\AppData\Local\...\S2SzqO.tmp, PE32 20->65 dropped 34 S2SzqO.tmp 30 18 20->34         started        119 Maps a DLL or memory area into another process 22->119 121 Creates a thread in another existing process (thread injection) 22->121 36 ctfmon.exe 1 22->36 injected 39 tasklist.exe 1 24->39         started        41 conhost.exe 24->41         started        43 findstr.exe 1 24->43         started        45 18 other processes 24->45 file9 signatures10 process11 dnsIp12 83 C:\Windows\Temp\vally3dka.sys, PE32+ 26->83 dropped 131 Benign windows process drops PE files 26->131 133 Sample is not signed and drops a device driver 26->133 135 Unusual module load detection (module proxying) 26->135 47 dllhost.exe 26->47         started        49 dllhost.exe 26->49         started        85 C:\ProgramData\Microsoft\...\MsMpEng.exe, Unicode 30->85 dropped 137 Infects executable files (exe, dll, sys, html) 30->137 51 conhost.exe 30->51         started        53 conhost.exe 32->53         started        87 C:\Users\user\AppData\...\unins000.exe (copy), PE32 34->87 dropped 89 C:\Users\user\AppData\...\is-0DUFG.tmp, PE32+ 34->89 dropped 91 C:\Users\user\...\d3dcompiler_47.dll (copy), PE32+ 34->91 dropped 93 6 other malicious files 34->93 dropped 55 Telegram.exe 34->55         started        101 103.112.99.215, 49725, 5551 ITACE-AS-APItaceInternationalLimitedHK China 36->101 139 Contains functionality to inject threads in other processes 36->139 141 Contains functionality to capture and log keystrokes 36->141 143 Contains functionality to inject code into remote processes 36->143 145 Tries to access browser extension known for cryptocurrency wallets 36->145 file13 signatures14 process15 dnsIp16 103 149.154.175.50, 443, 49736, 49739 TELEGRAM_MESSENGERRU United Kingdom 55->103 105 149.154.167.51, 443, 49730, 49733 TELEGRAMRU United Kingdom 55->105 107 4 other IPs or domains 55->107 69 C:\Users\user\AppData\...\d3dcompiler_47.dll, PE32+ 55->69 dropped 71 C:\Users\user\AppData\Roaming\...\Updater.exe, PE32+ 55->71 dropped 73 C:\Users\user\AppData\...\Telegram.exe, PE32+ 55->73 dropped file17
Gathering data
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-12-23 04:25:59 UTC
File Type:
PE (Exe)
Extracted files:
12
AV detection:
8 of 36 (22.22%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
defense_evasion discovery installer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Inno Setup is an open-source installation builder for Windows applications.
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Enumerates processes with tasklist
Checks installed software on the system
Drops desktop.ini file(s)
Executes dropped EXE
Loads dropped DLL
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware family:
ValleyRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:EDR_Killer_EDR_Freeze_Tool
Author:Valton Tahiri (cybee.ai)
Description:Detects EDR-Freeze tool in memory - EDR/AV freezing malware
Reference:https://www.linkedin.com/in/valton-tahiri/
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:GenericGh0st
Author:Still
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Suspicious_Process
Author:Security Research Team
Description:Suspicious process creation
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Trojan_Gh0st_9e4bb0ce
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments