MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4b16baf674e02084875303e4ae72066d7b6431340efe58a37b7840eb36b6a026. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 14


Intelligence 14 IOCs YARA 7 File information Comments

SHA256 hash: 4b16baf674e02084875303e4ae72066d7b6431340efe58a37b7840eb36b6a026
SHA3-384 hash: 9d97198c71625fdf51510ea57602b7393aa7fd7ef44f1c7e9a7746fdc2097fb9e262263567fd6547bba7b74de5a1f0c9
SHA1 hash: 9cc5b87c025b4a6416c40b63504902fd7ba5b41d
MD5 hash: 6b6fee2c5e2bdbff3d56362c72f5b2ac
humanhash: carolina-mars-bakerloo-pennsylvania
File name:run.exe
Download: download sample
File size:2'753'024 bytes
First seen:2026-02-28 10:11:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a50e815adb2cfe3e58d388c791946db8 (2 x njrat, 2 x DCRat, 2 x Babadeda)
ssdeep 49152:RImZHN4WVRUW0NCtUnDjl2KGSYfqZcx9O0+TmUydov1tp3U5QkNmRY3mWjYFJGUY:RImZHN4WTJ0NCt6lafqyxU7TmIvbpEZZ
Threatray 3'119 similar samples on MalwareBazaar
TLSH T181D533DCF0ADBCEAF0E25033A80BCDD508857D1965BB4BD769B31ECD17A900A31364A9
TrID 39.9% (.EXE) UPX compressed Win32 Executable (27066/9/6)
24.3% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
9.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.6% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter abuse_ch
Tags:exe UPX
File size (compressed) :2'753'024 bytes
File size (de-compressed) :2'759'168 bytes
Format:win32/pe
Unpacked file: 82ee9622989c0a02f9337ff4709b207392293fd3408d04af900b1e9e60904c3f

Intelligence


File Origin
# of uploads :
1
# of downloads :
119
Origin country :
SE SE
Vendor Threat Intelligence
Malware configuration found for:
BatToExeConverter PEPacker
Details
BatchScript
varying reportable information from embedded commands and any observed URLs
BatToExeConverter
an RC4 decrypted batch script or command line
PEPacker
a UPX version number and an unpacked binary
Malware family:
n/a
ID:
1
File name:
run.exe
Verdict:
Malicious activity
Analysis date:
2026-02-28 10:15:08 UTC
Tags:
upx uac golang

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
shell virus sage
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
packed packed packed packed upx
Result
Gathering data
Result
Threat name:
Gocoder
Detection:
malicious
Classification:
rans.phis.troj.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
Disables the Smart Screen filter
Disables UAC (registry)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Powershell drops PE file
Sigma detected: Bypass UAC via Fodhelper.exe
Sigma detected: Custom File Open Handler Executes PowerShell
Sigma detected: Fodhelper UAC Bypass
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
UAC bypass detected (Fodhelper)
Uses attrib.exe to hide files
Uses cmd line tools excessively to alter registry or file data
Yara detected Gocoder ransomware
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1876314 Sample: run.exe Startdate: 28/02/2026 Architecture: WINDOWS Score: 100 91 Multi AV Scanner detection for dropped file 2->91 93 Multi AV Scanner detection for submitted file 2->93 95 Yara detected Gocoder ransomware 2->95 97 7 other signatures 2->97 11 run.exe 9 2->11         started        14 svchost.exe 1 1 2->14         started        17 steamwebhelper.exe 2->17         started        process3 dnsIp4 79 C:\Users\user\AppData\...\steamwebhelper.exe, PE32+ 11->79 dropped 81 C:\Users\user\AppData\Local\Temp\...\C3AE.bat, ASCII 11->81 dropped 19 cmd.exe 2 11->19         started        89 127.0.0.1 unknown unknown 14->89 file5 process6 signatures7 101 Suspicious powershell command line found 19->101 103 Uses cmd line tools excessively to alter registry or file data 19->103 105 Bypasses PowerShell execution policy 19->105 107 2 other signatures 19->107 22 steamwebhelper.exe 19->22         started        26 powershell.exe 37 19->26         started        29 powershell.exe 14 17 19->29         started        31 4 other processes 19->31 process8 dnsIp9 83 connected.enzstack.xyz 22->83 85 connected.enzstack.xyz 45.83.207.111, 3128, 49692 CLOUVIDERClouvider-GlobalASNGB Netherlands 22->85 117 Suspicious powershell command line found 22->117 119 Performs DNS queries to domains with low reputation 22->119 121 Uses cmd line tools excessively to alter registry or file data 22->121 123 Adds a directory exclusion to Windows Defender 22->123 33 powershell.exe 22->33         started        35 reg.exe 1 22->35         started        38 reg.exe 22->38         started        42 5 other processes 22->42 71 C:\Users\user\AppData\Local\Temp\...\warz.exe, PE32+ 26->71 dropped 73 C:\Users\user\AppData\Local\...\udprand.exe, PE32+ 26->73 dropped 75 C:\Users\user\AppData\Local\...\udpconns.exe, PE32+ 26->75 dropped 77 8 other malicious files 26->77 dropped 125 Loading BitLocker PowerShell Module 26->125 87 147.50.253.3, 49681, 80 CSLOX-IDC-AS-APCSLOXINFOPublicCompanyLimitedTH Thailand 29->87 127 Powershell drops PE file 29->127 40 cmd.exe 1 31->40         started        file10 signatures11 process12 signatures13 44 fodhelper.exe 33->44         started        47 conhost.exe 33->47         started        109 Disables UAC (registry) 35->109 49 conhost.exe 35->49         started        111 Disables the Smart Screen filter 38->111 51 conhost.exe 38->51         started        53 conhost.exe 40->53         started        55 timeout.exe 1 40->55         started        113 UAC bypass detected (Fodhelper) 42->113 115 Loading BitLocker PowerShell Module 42->115 57 conhost.exe 42->57         started        59 conhost.exe 42->59         started        61 3 other processes 42->61 process14 signatures15 129 Adds a directory exclusion to Windows Defender 44->129 63 cmd.exe 44->63         started        process16 signatures17 131 Suspicious powershell command line found 63->131 133 Adds a directory exclusion to Windows Defender 63->133 66 powershell.exe 63->66         started        69 conhost.exe 63->69         started        process18 signatures19 99 Loading BitLocker PowerShell Module 66->99
Gathering data
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2026-02-28 00:55:54 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
16 of 36 (44.44%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
defense_evasion discovery execution persistence trojan upx
Behaviour
Delays execution with timeout.exe
Modifies registry class
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Views/modifies file attributes
Enumerates physical storage devices
System Location Discovery: System Language Discovery
UPX packed file
Checks computer location settings
Executes dropped EXE
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
UAC bypass
Unpacked files
SH256 hash:
4b16baf674e02084875303e4ae72066d7b6431340efe58a37b7840eb36b6a026
MD5 hash:
6b6fee2c5e2bdbff3d56362c72f5b2ac
SHA1 hash:
9cc5b87c025b4a6416c40b63504902fd7ba5b41d
SH256 hash:
82ee9622989c0a02f9337ff4709b207392293fd3408d04af900b1e9e60904c3f
MD5 hash:
e3c28c425dffe254b7cd8f37d8df9142
SHA1 hash:
235a08e875bee8664286168b481a5f2469ebfce4
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:UPX20030XMarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 4b16baf674e02084875303e4ae72066d7b6431340efe58a37b7840eb36b6a026

(this sample)

Comments