MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3cd2ca1a45a96733269d60397d84b451e4b4f0b7f7cdc3c152bf9e88db773199. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 18
| SHA256 hash: | 3cd2ca1a45a96733269d60397d84b451e4b4f0b7f7cdc3c152bf9e88db773199 |
|---|---|
| SHA3-384 hash: | a08ddcf71a3997a4913d131fb8615280eed4ad532a1223ab85eab00edf6314200611ddecf78b9340feae8dc5f79d0085 |
| SHA1 hash: | cb7ac5e5e329336f1c4ac70918d4c11040745c82 |
| MD5 hash: | 2eb933d559c31066afbc930757b884a7 |
| humanhash: | massachusetts-zebra-dakota-zulu |
| File name: | SecuriteInfo.com.PowerShell.Dropper.54.16770.29263 |
| Download: | download sample |
| File size: | 2'347'965 bytes |
| First seen: | 2025-12-29 10:20:31 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f6baa5eaa8231d4fe8e922a2e6d240ea (66 x CoinMiner, 22 x DCRat, 15 x LummaStealer) |
| ssdeep | 49152:xgwRWCatzqbMLZRRmz4RC8QvCI9BsNapVi4BMY82IrE3rz2oSeYL:xgwR2qbMrRG4RCfvCI9BsuVi4WDrazOL |
| Threatray | 1'154 similar samples on MalwareBazaar |
| TLSH | T192B533017BF884F1E2AC2C7851A126A296B9ADA2073641D3D7513DC295B32F0E73F7D9 |
| TrID | 38.7% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 24.6% (.EXE) Win64 Executable (generic) (10522/11/4) 11.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 10.5% (.EXE) Win32 Executable (generic) (4504/4/1) 4.7% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| dhash icon | 68e0c0c4c4c4c4d8 (2 x Mimic, 1 x SalatStealer) |
| Reporter | |
| Tags: | exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
161
Origin country :
FRVendor Threat Intelligence
Malware configuration found for:
Archives
Details
Archives
an extracted 7-zip archive from the overlay data and SFX commands
Archives
extracted archive contents
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.PowerShell.Dropper.54.16770.29263
Verdict:
Malicious activity
Analysis date:
2025-12-29 11:07:42 UTC
Tags:
everything tool auto-reg auto generic smb ransomware
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Verdict:
Malicious
Score:
96.5%
Tags:
shell virus sage
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
adaptive-context fingerprint installer installer installer-heuristic keylogger masquerade microsoft_visual_cc obfuscated overlay overlay ransomware
Verdict:
Malicious
Labled as:
Win/malicious_confidence_60%
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-12-29T07:24:00Z UTC
Last seen:
2025-12-31T06:23:00Z UTC
Hits:
~10
Detections:
Trojan-Ransom.Win32.Mimic.sb Trojan-Ransom.Win32.Encoder.sb Trojan-Ransom.Win32.Agent.sb Trojan.PowerShell.Kriptik.sba PDM:Trojan.Win32.Generic BSS:HackTool.Win32.Yzon.a Trojan.Win32.Agent.sb Trojan.PowerShell.Cobalt.sb HEUR:Trojan-Ransom.Win32.Generic HEUR:HackTool.Win64.NoDefender.a
Malware family:
Mimic Ransomware
Verdict:
Malicious
Score:
54%
Verdict:
Susipicious
File Type:
PE
Verdict:
Malware
YARA:
5 match(es)
Tags:
DeObfuscated Executable PE (Portable Executable) PE File Layout PowerShell SFX 7z Win 32 Exe x86
Verdict:
Malicious
Threat:
Trojan-Ransom.Win32.Kriptik
Threat name:
Win32.Ransomware.Pay2Key
Status:
Suspicious
First seen:
2025-12-29 10:21:16 UTC
File Type:
PE (Exe)
Extracted files:
14
AV detection:
13 of 24 (54.17%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
hacktool_defendernot
Similar samples:
+ 1'144 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
7/10
Tags:
discovery execution upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
UPX packed file
Command and Scripting Interpreter: PowerShell
Checks computer location settings
Executes dropped EXE
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
3cd2ca1a45a96733269d60397d84b451e4b4f0b7f7cdc3c152bf9e88db773199
MD5 hash:
2eb933d559c31066afbc930757b884a7
SHA1 hash:
cb7ac5e5e329336f1c4ac70918d4c11040745c82
SH256 hash:
e37aa72bca3cecb9bdbe51cbd81ec1143bb17163088a1379a4ccb93f5d881e76
MD5 hash:
5cac4fe734fc8454ccb847e030beee38
SHA1 hash:
34298fe220e35f614b2c837cf1dc2604ab0882d6
SH256 hash:
ad80064f71d273967dcf0b14b9cd6e84d79a132231d619687d9266c7807bdfe0
MD5 hash:
a35ee23aaab26afc575ac83df9572b57
SHA1 hash:
81ea38c694ce9702faddfb961f17c1bbf628a76d
SH256 hash:
00b9c0120df0595184523a3620ef9b3c3e11fc0e61d366d7eeabb646647cfceb
MD5 hash:
bd1f243ee2140f2f6118a7754ea02a63
SHA1 hash:
cdf7dd7dd1771edcc473037af80afd7e449e30d9
SH256 hash:
0377585ec50ed2e1b3d8519be272599f31024accd20b484ddae8240e09cc83b4
MD5 hash:
13d3997b43c3d5cbafb0ff10b6f0dee1
SHA1 hash:
e650a76f3fa8d28e2ff3751ccf44d124ef2b82bd
SH256 hash:
31ff14caa84eb19b43e60c9f0166e2db823b639cbef6bb8ecceb6bb3fb33ef33
MD5 hash:
26bf8c415d208bc2d1286821d8fbb66b
SHA1 hash:
4241fea673391b6f04239ec19c4d907d379cc35e
SH256 hash:
fabe67d8afe3c1b68843fddf1ee082e8d7616472c7a9a7dbeebbe0f2f28cbb10
MD5 hash:
93a44df99ac8e2849e953704cfa46e94
SHA1 hash:
5e16df7a1a90bae13645a3ec23818be64a9b4905
SH256 hash:
34e825f579aebdd847cda9a15eba02c84e570ba9b8fd74285d0a83b82dbd6610
MD5 hash:
17870cb962216c9822c224bafe8429c3
SHA1 hash:
2969bb678cf85514cf8edee1d873139fc3d0c72e
Detections:
INDICATOR_SUSPICIOUS_GENRansomware
INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
INDICATOR_SUSPICIOUS_ClearWinLogs
INDICATOR_SUSPICIOUS_USNDeleteJournal
SH256 hash:
e84589d33771a0ab3d64f1b12381d436c3453dac3141626b3a8dfcb8db3056ff
MD5 hash:
2e69bf16d84935b3f57244c14c03839a
SHA1 hash:
06553d6b59017ea580e15455b3a196fbebf297f7
SH256 hash:
3481abf5c89eed4830cb2d8192c4da357b17866dd9e351898db68d814401cc83
MD5 hash:
510827aa18fb2e577aadc14039139984
SHA1 hash:
1ee826e2213aff3e87b042c347f94673d4a3fba9
SH256 hash:
374ea77e9e8a1b6081bda8fb7728861f947cf9e543ae23c54e39cddd7b8f49c3
MD5 hash:
fef2ff6b172fd75582a80ea59be5f71a
SHA1 hash:
58036494383491f870c83ccdeddc4fa3fc845f88
SH256 hash:
f457b1cb1b146ab07117e34dc50881ef787946a0311467d82469fdaa3e54884c
MD5 hash:
52b7073101ce2f83c85ed698f1ee0445
SHA1 hash:
cd2f016c79de7d4bf20d1366cc9483b610b4ffc2
SH256 hash:
49f23f83807913b84917cfdb800ac04d905fdc844f4b41b6aaf894506864355b
MD5 hash:
0faecd43382ab6f35d8b2be61939377e
SHA1 hash:
c6295657d52bc5dc16fa2542be23dac7948fa400
SH256 hash:
40868479f0df49de5ae66ff2e3f93eb81c1f7b8e1b3f67bfb5b32594367012b8
MD5 hash:
b886249584d7a1ebf40da981bbba4ec2
SHA1 hash:
df03b7b2a9e7cc4b524a523e1a3889c078ba3988
SH256 hash:
e48661fe1583f74fdd75b73f1beaa91add5f63554fad11582161db166e1f2081
MD5 hash:
1849a3deab2a286a2f2be7586309da14
SHA1 hash:
5c5a706d6e71f5b1b520beb10e9bc52e66d2f75a
Malware family:
Mimic
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.