MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 45153e2ab3b109dddc846c01c4fa8c49afa0c90e5d3e0570813c740c8f0a0283. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 12


Intelligence 12 IOCs YARA 6 File information Comments

SHA256 hash: 45153e2ab3b109dddc846c01c4fa8c49afa0c90e5d3e0570813c740c8f0a0283
SHA3-384 hash: 7c74cbc2e5232600150c15131cf34f9330a0ae5c3e0b27cce0cb97cbec216ad1b6ab444b80b5156fa6d302ceecf84fca
SHA1 hash: de4d0a26f18fd2b7146b45c2bf3898f08c863dbf
MD5 hash: e7d92dbdd2b3739aa3587243c26792ee
humanhash: montana-solar-thirteen-september
File name:SecuriteInfo.com.Generic.Dacic.6942.B32E6AD2.23984.4897
Download: download sample
File size:32'256 bytes
First seen:2025-12-20 14:18:17 UTC
Last seen:2025-12-20 15:18:17 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2530a16bbdceacdf239a430ffb41c4bb
ssdeep 768:lTtlyy3y+8aqIy9bOTEeYL3Rs4pK6q8hywbdmvxN3:lauSIy9STCrg6xEw4xN3
TLSH T15BE2F1123B70828CF0F5EB31C2BA59962763F07809674B1A478168FDECB51A2DDDCE15
TrID 63.5% (.EXE) UPX compressed Win64 Executable (70117/5/12)
24.5% (.EXE) UPX compressed Win32 Executable (27066/9/6)
4.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.8% (.ICL) Windows Icons Library (generic) (2059/9)
1.8% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter SecuriteInfoCom
Tags:exe UPX
File size (compressed) :32'256 bytes
File size (de-compressed) :67'584 bytes
Format:win64/pe
Unpacked file: fd9145bc43e7fb92d17da36a5940210057d2dd8f7ddf1cc4d2448dce97177522

Intelligence


File Origin
# of uploads :
2
# of downloads :
93
Origin country :
FR FR
Vendor Threat Intelligence
Malware configuration found for:
PEPacker
Details
PEPacker
a UPX version number and an unpacked binary
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Generic.Dacic.6942.B32E6AD2.23984.4897
Verdict:
Suspicious activity
Analysis date:
2025-12-20 14:21:06 UTC
Tags:
auto-startup upx

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
backdoor autorun agent virus
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug crypto packed packed packed packed upx
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-12-20T10:58:00Z UTC
Last seen:
2025-12-22T10:12:00Z UTC
Hits:
~100
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Trojan.Etset
Status:
Malicious
First seen:
2025-12-20 14:19:14 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
upx
Behaviour
UPX packed file
Drops startup file
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
45153e2ab3b109dddc846c01c4fa8c49afa0c90e5d3e0570813c740c8f0a0283
MD5 hash:
e7d92dbdd2b3739aa3587243c26792ee
SHA1 hash:
de4d0a26f18fd2b7146b45c2bf3898f08c863dbf
SH256 hash:
fd9145bc43e7fb92d17da36a5940210057d2dd8f7ddf1cc4d2448dce97177522
MD5 hash:
7337b1d9fb55350eea6bde0641f36ce4
SHA1 hash:
13295f4fce768b333687ba55a6afc757c4213cfd
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 45153e2ab3b109dddc846c01c4fa8c49afa0c90e5d3e0570813c740c8f0a0283

(this sample)

Comments