MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3246fdc5c32e6b265880c004ebee3d7aa2d9bcb0c01874c03616e2b736f9e825. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
DarkCloud
Vendor detections: 12
| SHA256 hash: | 3246fdc5c32e6b265880c004ebee3d7aa2d9bcb0c01874c03616e2b736f9e825 |
|---|---|
| SHA3-384 hash: | a63b98f9b772176fe650bf699788c876d87b45cc0c0fad6a3faa96483aefa0b3a31a25cdf5115660bb9faa767e163dd9 |
| SHA1 hash: | 636034e634a92fd176726fdac88053413fadd88b |
| MD5 hash: | f4c849118459cfef69795a64c71e7f88 |
| humanhash: | vermont-hot-bulldog-lemon |
| File name: | 3246fdc5c32e6b265880c004ebee3d7aa2d9bcb0c01874c03616e2b736f9e825 |
| Download: | download sample |
| Signature | DarkCloud |
| File size: | 1'157'120 bytes |
| First seen: | 2026-03-06 15:41:35 UTC |
| Last seen: | 2026-03-06 16:31:03 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'843 x AgentTesla, 19'775 x Formbook, 12'297 x SnakeKeylogger) |
| ssdeep | 12288:dG5/0OmtTYokGOuXJxNB3+MLi6xsvf5vknREwIi0+FlN6YMSK31xo/R21KObAS4e:05sooNOYwMWgkWEd9qlNc3oo1KObD/ |
| TLSH | T1DD35D00A0EC36B94D1984F78D2A604E827F0D65B5212E36F6FDD52F4DEA3F4AC907462 |
| TrID | 72.4% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 6.4% (.EXE) Win64 Executable (generic) (6522/11/2) 4.4% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| Magika | pebin |
| Reporter | |
| Tags: | DarkCloud exe |
Intelligence
File Origin
HUVendor Threat Intelligence
Details
Result
Behaviour
Unpacked files
3fedec832e464055478f1f221aa42fe894b227f168c59bb5ba9e8f2eefdd53cb
238441c6a05dd55e6cee3b33c991a8d91302c9e687e4607f2b33ca74dc850ea5
9992e4177343a1227f6a60f77f6556f5df92b30ce35b5521ee4156bb4fabb844
95a769c7e3b0b372e3e4d9534127d61fdeef9186ccc99ed88cba00423178da29
3246fdc5c32e6b265880c004ebee3d7aa2d9bcb0c01874c03616e2b736f9e825
018f85786e3cbf158c1a9d44c0d82bdd8d86958e7f8eb9e8dc74e3293f42c068
de4146aee4fd1bf6fc685015022b9931ca6eead9d42d440df166e15d521742ae
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.