MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3c573e66b191de9b5f1dd3ec278533a6bba4dd68d6f44735168e0e6075ed00e5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
XTinyLoader
Vendor detections: 15
| SHA256 hash: | 3c573e66b191de9b5f1dd3ec278533a6bba4dd68d6f44735168e0e6075ed00e5 |
|---|---|
| SHA3-384 hash: | 621e0ee6e1b8596aa8d3edeb06ae3c6e64f440344da27f9bb76265fc09850722578dfd8fa1aa16492cd60e17039ecc82 |
| SHA1 hash: | c5c8825df0fecf6d435f38b9eed1a836da1fcb2c |
| MD5 hash: | cbb33955aaaebba8b5c5137e3bf6e81f |
| humanhash: | green-florida-wyoming-minnesota |
| File name: | 3c573e66b191de9b5f1dd3ec278533a6bba4dd68d6f44735168e0e6075ed00e5 |
| Download: | download sample |
| Signature | XTinyLoader |
| File size: | 12'195'328 bytes |
| First seen: | 2025-07-31 11:53:21 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | d21c4bba2e4623145b475c957df80f42 (19 x XTinyLoader, 1 x RedLineStealer, 1 x PythonStealer) |
| ssdeep | 196608:CQ3WbPzY4CdFkSgwB7CF5I9ZFzBWmTlXxfShJ9NSMRvCAA4QcqRT5Z:CQ3KEnd+2hCF5IbzWlpNSMxCB4gj |
| TLSH | T13DC633917706C031C2A152310DA7EBA3452D782E8B657BCBBF900F7D9E241F27A76B25 |
| TrID | 30.2% (.EXE) Win64 Executable (generic) (10522/11/4) 18.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 14.5% (.EXE) Win16 NE executable (generic) (5038/12/1) 12.9% (.EXE) Win32 Executable (generic) (4504/4/1) 5.9% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | Amadey exe XTinyLoader |
Intelligence
File Origin
ITVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | botnet_plaintext_c2 |
|---|---|
| Author: | cip |
| Description: | Attempts to match at least some of the strings used in some botnet variants which use plaintext communication protocols. |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | FreddyBearDropper |
|---|---|
| Author: | Dwarozh Hoshiar |
| Description: | Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip. |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | INDICATOR_EXE_Packed_Themida |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with Themida |
| Rule name: | MAL_Win_Amadey_Jun25 |
|---|---|
| Author: | 0x0d4y |
| Description: | This rule detects intrinsic patterns of Amadey version 5.34 |
| Reference: | https://0x0d4y.blog/amadey-targeted-analysis/ |
| Rule name: | MD5_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for MD5 constants |
| Rule name: | ScanStringsInsocks5systemz |
|---|---|
| Author: | Byambaa@pubcert.mn |
| Description: | Scans presence of the found strings using the in-house brute force method |
| Rule name: | SUSP_XORed_Mozilla_Oct19 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key. |
| Reference: | https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force() |
| Rule name: | SUSP_XORed_Mozilla_RID2DB4 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious XORed keyword - Mozilla/5.0 |
| Reference: | Internal Research |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | ThreadControl__Context |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | vmdetect |
|---|---|
| Author: | nex |
| Description: | Possibly employs anti-virtualization techniques |
| Rule name: | win_amadey_062025 |
|---|---|
| Author: | 0x0d4y |
| Description: | This rule detects intrinsic patterns of Amadey version 5.34. |
| Reference: | https://0x0d4y.blog/amadey-targeted-analysis/ |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::LoadLibraryW KERNEL32.dll::LoadLibraryA KERNEL32.dll::GetCommandLineW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.