MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 34c240e0decac9959be2b5a3a96c7dbbbbe3b2db6543161c2605c36f3815a2b6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 7 File information Comments

SHA256 hash: 34c240e0decac9959be2b5a3a96c7dbbbbe3b2db6543161c2605c36f3815a2b6
SHA3-384 hash: 22e55faee5c2460ca796d12a972bfc49becb1d981e4119d355e3f78f8c9a2b627a363ce40e5899ae97a9031b292c0b80
SHA1 hash: b2bd2f0c9181e878ee6879c4aa071f849fbc6c9a
MD5 hash: 4da694f10eecff946c4eb0d0c48f4940
humanhash: california-juliet-butter-queen
File name:file
Download: download sample
File size:14'060'032 bytes
First seen:2026-03-01 18:30:50 UTC
Last seen:2026-03-01 18:34:17 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 74f4f918cc15caa2178da4a8adcd29a7
ssdeep 196608:UPApNMDftbW897GDr/x7eovq5XMP6PzFcPVz097WpHskNqSPrGuZRjMFqbH4Mirc:W1yNdq1B7iR0gpHskqSPjZpiqbH4a7
TLSH T1B4E6338453D14A66FAE7E13D45A7E051D1B2F8105B228ACF4FE44B673F1B2E14E3AB90
TrID 33.1% (.EXE) Win64 Executable (generic) (6522/11/2)
25.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.4% (.ICL) Windows Icons Library (generic) (2059/9)
10.3% (.EXE) OS/2 Executable (generic) (2029/13)
10.1% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter Bitsight
Tags:a3dacb dropped-by-amadey exe


Avatar
Bitsight
url: http://id8965.com/Launcher.exe

Intelligence


File Origin
# of uploads :
6
# of downloads :
132
Origin country :
US US
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2026-03-01 18:35:03 UTC
Tags:
stealer python pyinstaller

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
70.0%
Tags:
installer extens remo
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm expand lolbin microsoft_visual_cc packed
Result
Gathering data
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 64 Exe x64
Result
Malware family:
n/a
Score:
  7/10
Tags:
pyinstaller
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Detects Pyinstaller
Executes dropped EXE
Loads dropped DLL
Unpacked files
SH256 hash:
34c240e0decac9959be2b5a3a96c7dbbbbe3b2db6543161c2605c36f3815a2b6
MD5 hash:
4da694f10eecff946c4eb0d0c48f4940
SHA1 hash:
b2bd2f0c9181e878ee6879c4aa071f849fbc6c9a
SH256 hash:
f15d718755c40633ff0484f75574c191d96f89ea8f32bf3eda221bc3c98ed763
MD5 hash:
2cb8768dba886fd37dfdd45d9d8660a3
SHA1 hash:
ef597f39274d7f882d66457cd341745651f61c5f
Detections:
PyInstaller
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Detect_PyInstaller
Author:Obscurity Labs LLC
Description:Detects PyInstaller compiled executables across platforms
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:PyInstaller
Author:@bartblaze
Description:Identifies executable converted using PyInstaller. This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:telebot_framework
Author:vietdx.mb
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 34c240e0decac9959be2b5a3a96c7dbbbbe3b2db6543161c2605c36f3815a2b6

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

Comments