MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 39f9674b361e83875a551bd09a49d0cc152c7fcb70f3a62970cf13a4871b97b6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA 6 File information Comments

SHA256 hash: 39f9674b361e83875a551bd09a49d0cc152c7fcb70f3a62970cf13a4871b97b6
SHA3-384 hash: b7a988b586faee4c2d616643f3f3facc6c98e7a585c5b2c0c90d407cfbe2a7856371e6f8f4626babd408473e79d14736
SHA1 hash: e7e71829adbaf6e59260d4f43d7ab3e88b849bfd
MD5 hash: 591972e5b3fed432385698e19cc0c054
humanhash: saturn-asparagus-maine-quebec
File name:AlliAi.exe
Download: download sample
File size:63'727'808 bytes
First seen:2025-12-10 20:07:44 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e8ac1646024d52d1534a88da2e8037cd (9 x OffLoader, 9 x HijackLoader, 8 x ValleyRAT)
ssdeep 1572864:rMxgawnBvLDvOrx7LViLynK5dWcIPr8dRuE/1RBxc:rMxFwNvwiL8+ds8u01RBG
TLSH T160D73313B6CE233EF40E8A3D0D97A554287BB975522E8C5796B04E5CCE290912CBEF17
TrID 62.3% (.EXE) Inno Setup installer (107240/4/30)
24.1% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
6.1% (.EXE) Win64 Executable (generic) (10522/11/4)
2.6% (.EXE) Win32 Executable (generic) (4504/4/1)
1.2% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Magika pebin
dhash icon bab6dad8d4e6babe (1 x NetSupport)
Reporter aachum
Tags:188-137-248-240 AlliAI exe signed

Code Signing Certificate

Organisation:Next-Gen Supplements Inc.
Issuer:Microsoft ID Verified CS EOC CA 01
Algorithm:sha384WithRSAEncryption
Valid from:2025-12-07T12:23:34Z
Valid to:2025-12-10T12:23:34Z
Serial number: 330005a844de10aee66d4a060700000005a844
Cert Graveyard Blocklist:This certificate is on the Cert Graveyard blocklist
Thumbprint Algorithm:SHA256
Thumbprint: ed431dda10f976f45632a985bae4d94513db956d50b1dd6046343bbbec51c851
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
iamaachum
https://alliai.us/

IOC: 188.137.248.240

Intelligence


File Origin
# of uploads :
1
# of downloads :
206
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
_39f9674b361e83875a551bd09a49d0cc152c7fcb70f3a62970cf13a4871b97b6
Verdict:
No threats detected
Analysis date:
2025-12-10 20:09:00 UTC
Tags:
nodejs

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
91.7%
Tags:
ransomware vmdetect dropper remo
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
adaptive-context anti-debug anti-vm base64 crypto embarcadero_delphi expired-cert fingerprint inno installer installer installer-heuristic overlay packed short-lived-cert signed
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-12-08T23:26:00Z UTC
Last seen:
2025-12-11T11:50:00Z UTC
Hits:
~10
Detections:
Trojan.Win32.Alien.ajwh HEUR:Trojan.Script.Generic
Result
Threat name:
n/a
Detection:
suspicious
Classification:
evad
Score:
24 / 100
Signature
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1830561 Sample: AlliAi.exe Startdate: 10/12/2025 Architecture: WINDOWS Score: 24 59 Joe Sandbox ML detected suspicious sample 2->59 11 AlliAi.exe 2 2->11         started        process3 file4 57 C:\Users\user\AppData\Local\...\AlliAi.tmp, PE32 11->57 dropped 14 AlliAi.tmp 3 4 11->14         started        process5 process6 16 AlliAi.exe 2 14->16         started        file7 47 C:\Users\user\AppData\Local\...\AlliAi.tmp, PE32 16->47 dropped 19 AlliAi.tmp 5 80 16->19         started        process8 file9 49 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 19->49 dropped 51 C:\Users\user\AppData\...\vulkan-1.dll (copy), PE32+ 19->51 dropped 53 C:\Users\user\...\vk_swiftshader.dll (copy), PE32+ 19->53 dropped 55 18 other files (none is malicious) 19->55 dropped 22 AApp.exe 12 19->22         started        process10 process11 24 powershell.exe 36 22->24         started        27 powershell.exe 22->27         started        29 powershell.exe 22->29         started        31 22 other processes 22->31 signatures12 61 Loading BitLocker PowerShell Module 24->61 33 conhost.exe 24->33         started        35 conhost.exe 27->35         started        37 conhost.exe 29->37         started        39 conhost.exe 31->39         started        41 chcp.com 1 31->41         started        43 conhost.exe 31->43         started        45 18 other processes 31->45 process13
Gathering data
Result
Malware family:
n/a
Score:
  5/10
Tags:
discovery execution installer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Inno Setup is an open-source installation builder for Windows applications.
Command and Scripting Interpreter: PowerShell
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Executes dropped EXE
Loads dropped DLL
Checks computer location settings
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 39f9674b361e83875a551bd09a49d0cc152c7fcb70f3a62970cf13a4871b97b6

(this sample)

  
Delivery method
Distributed via web download

Comments