MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 497ed5bca59fa6c01f80d55c5f528a40daff4e4afddfbe58dbd452c45d4866a3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 4 File information Comments

SHA256 hash: 497ed5bca59fa6c01f80d55c5f528a40daff4e4afddfbe58dbd452c45d4866a3
SHA3-384 hash: ce4a5c6477b7513cd81bb159a6a4c8fcbecf5fb19aa6774a68ffe26be4cc1c34951ba13ac4d83f700c49eaf0c2237c44
SHA1 hash: dc0a40c8f2279c223ad2f832fc3c894ae0be7ec6
MD5 hash: 8b9ad525283aa40a1af0a6b0d3e5b94d
humanhash: alanine-speaker-uncle-floor
File name:497ed5bca59fa6c01f80d55c5f528a40daff4e4afddfbe58dbd452c45d4866a3
Download: download sample
File size:1'037'776 bytes
First seen:2025-09-19 13:07:23 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 08fd62a9d05cc8111782017958ea975d (2 x ModiLoader, 1 x AkiraStealer, 1 x RedLineStealer)
ssdeep 24576:ll4vnP/XZeyT0ScDNu936omj8EjV6hJ0Pa4/bmoTnK:ll4f5eS0ScD4KoccJerbmou
TLSH T16625024AB6B821F5E167D178CDD1964AE7B274818730939B076087BB5F137E4BC2E322
TrID 44.4% (.EXE) Win64 Executable (generic) (10522/11/4)
21.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.EXE) Win16/32 Executable Delphi generic (2072/23)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
dhash icon f6b4a8ba6492985a (2 x RedLineStealer, 1 x Pony, 1 x GuLoader)
Reporter JAMESWT_WT
Tags:calendaromatic-com CROWN-SKY-LLC exe signed TamperedChef

Code Signing Certificate

Organisation:CROWN SKY LLC
Issuer:GlobalSign GCC R45 EV CodeSigning CA 2020
Algorithm:sha256WithRSAEncryption
Valid from:2025-01-10T17:29:36Z
Valid to:2026-01-11T17:29:36Z
Serial number: 4bc8e9da91cb67f9ea1b6079
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
Cert Graveyard Blocklist:This certificate is on the Cert Graveyard blocklist
Thumbprint Algorithm:SHA256
Thumbprint: d8ece6aefad69cf4c6c64fe685fcd2cfb4efeb51760e89b5c4c78d5edc21110b
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
83
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
497ed5bca59fa6c01f80d55c5f528a40daff4e4afddfbe58dbd452c45d4866a3
Verdict:
No threats detected
Analysis date:
2025-09-19 13:13:23 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
injection packed virus
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Сreating synchronization primitives
Launching a process
Searching for synchronization primitives
Launching a service
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
adaptive-context fingerprint installer keylogger overlay packed packer_detected signed threat
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout SFX 7z SVG Win 64 Exe x64
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion discovery trojan
Behaviour
Enumerates system info in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Checks whether UAC is enabled
Network Share Discovery
Checks computer location settings
Executes dropped EXE
Unpacked files
SH256 hash:
497ed5bca59fa6c01f80d55c5f528a40daff4e4afddfbe58dbd452c45d4866a3
MD5 hash:
8b9ad525283aa40a1af0a6b0d3e5b94d
SHA1 hash:
dc0a40c8f2279c223ad2f832fc3c894ae0be7ec6
SH256 hash:
69934dc1d4fdb552037774ee7a75c20608c09680128c9840b508551dbcf463ad
MD5 hash:
d6951153ad26cc86cd06fde37530e4f4
SHA1 hash:
7430db4c3a2a7465a19d453e41a7a9d34ceb33e9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:observer
Author:Michelle Khalil
Description:This rule detects unpacked observer malware samples.
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments