MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 47d402d737a9c4af4260926157f8dfc66066f5becbff74885ec586e4cd0ae773. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 12


Intelligence 12 IOCs YARA 5 File information Comments

SHA256 hash: 47d402d737a9c4af4260926157f8dfc66066f5becbff74885ec586e4cd0ae773
SHA3-384 hash: bbf6924bafde943eacb4464fa32ce1ff85f7b6476f60d6b3c4a1c39673fa55081efbecd7f63f2114202fd9f15c386ff0
SHA1 hash: 69dbf7c234404dab3689c419f42009d8f58ca61a
MD5 hash: 123b3bd746f1c889826a443143d1f004
humanhash: princess-island-maryland-oxygen
File name:accusa.lnk
Download: download sample
File size:79'832 bytes
First seen:2025-12-25 14:19:24 UTC
Last seen:Never
File type:Shortcut (lnk) lnk
MIME type:application/x-ms-shortcut
ssdeep 1536:jyYzOWSdvltxlqhd9JsauHM4iisVauAIvTsJLMF4Es:HSWSBLxyrJWMBJvwJIFHs
TLSH T15073CE24CABF10B9DEC9FF7F5193E6612B11625B2E606D343FF0A38A1DB5520842C94E
Magika lnk
Reporter abuse_ch
Tags:lnk

Intelligence


File Origin
# of uploads :
1
# of downloads :
27
Origin country :
SE SE
Vendor Threat Intelligence
Malware configuration found for:
LNK
Details
LNK
a command line and any observed urls
Verdict:
Malicious
Score:
99.1%
Tags:
dropper virus shell
Result
Verdict:
Malicious
File Type:
LNK File - Malicious
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
cmd evasive forfiles lolbin masquerade wscript
Result
Gathering data
Verdict:
Malicious
File Type:
lnk
First seen:
2025-12-19T05:11:00Z UTC
Last seen:
2025-12-19T05:36:00Z UTC
Hits:
~10
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
76 / 100
Signature
Command shell drops VBS files
Multi AV Scanner detection for submitted file
Obfuscated command line found
Sigma detected: WScript or CScript Dropper
Uses certutil -decode
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Windows shortcut file (LNK) starts blacklisted processes
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1839363 Sample: accusa.lnk Startdate: 25/12/2025 Architecture: WINDOWS Score: 76 31 Windows shortcut file (LNK) starts blacklisted processes 2->31 33 Multi AV Scanner detection for submitted file 2->33 35 Uses certutil -decode 2->35 37 2 other signatures 2->37 6 cmd.exe 3 2->6         started        10 certutil.exe 1 2->10         started        12 explorer.exe 2->12         started        14 explorer.exe 1 5 2->14         started        process3 file4 27 C:\Users\user\AppData\Roaming\...\pwcvzju.vbs, ASCII 6->27 dropped 39 Command shell drops VBS files 6->39 16 wscript.exe 7 3 6->16         started        19 forfiles.exe 1 6->19         started        21 conhost.exe 1 6->21         started        23 more.com 1 6->23         started        25 conhost.exe 10->25         started        signatures5 process6 signatures7 29 Windows Scripting host queries suspicious COM object (likely to drop second stage) 16->29
Verdict:
Malware
YARA:
3 match(es)
Tags:
Execution: CMD in LNK LNK LOLBin LOLBin:cmd.exe Malicious T1059.003 T1202: Indirect Command Execution T1204.002
Threat name:
Win32.Trojan.Sonbokli
Status:
Malicious
First seen:
2025-12-18 18:18:25 UTC
File Type:
Binary
Extracted files:
1
AV detection:
12 of 38 (31.58%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion persistence privilege_escalation spyware stealer
Behaviour
Modifies registry class
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Checks computer location settings
Event Triggered Execution: Component Object Model Hijacking
Indirect Command Execution
Reads user/profile data of web browsers
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Archive_in_LNK
Author:@bartblaze
Description:Identifies archive (compressed) files in shortcut (LNK) files.
Rule name:Execution_in_LNK
Author:@bartblaze
Description:Identifies execution artefacts in shortcut (LNK) files.
Rule name:Find_Emotoet_LNK_File_VBS
Author:David Ledbetter
Description:Search for lnk files dropping vbs files.
Rule name:LNK_sospechosos
Author:Germán Fernández
Description:Detecta archivos .lnk sospechosos
Rule name:Script_in_LNK
Author:@bartblaze
Description:Identifies scripting artefacts in shortcut (LNK) files.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments