MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4bdcccc7b3b064e3b7b0477614fea345e88367a068acfb14c8abbf269f501028. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 8 File information Comments

SHA256 hash: 4bdcccc7b3b064e3b7b0477614fea345e88367a068acfb14c8abbf269f501028
SHA3-384 hash: e821617ecde61f119dc1abb1cd3c3cdd73c6de25db30cbfbaa40db1105093b7080965f82258adf0c4257cec1b9714857
SHA1 hash: 154fae80f7a8a515d401f4de206986af8f0f3074
MD5 hash: 7a61c0708077d04017e5d8cd3b455d54
humanhash: blue-edward-may-august
File name:Installer.exe
Download: download sample
File size:7'332'848 bytes
First seen:2025-11-20 10:38:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'844 x AgentTesla, 19'775 x Formbook, 12'297 x SnakeKeylogger)
ssdeep 196608:mklm8i98p5sXnfykb5WaAfgBf6GlCMk0PU/:mko38pq50fKB26c
TLSH T1557633238E6CEADAC6F6DB37DA259D83072721079C5587D1E5C63B38430BED84A593E0
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10522/11/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter SquiblydooBlog
Tags:exe signed

Code Signing Certificate

Organisation:Beyond Ideas LLC
Issuer:SSL.com EV Code Signing Intermediate CA RSA R3
Algorithm:sha256WithRSAEncryption
Valid from:2025-08-22T08:56:05Z
Valid to:2026-07-24T19:31:05Z
Serial number: 3a2844fba53eed9f3c50390f0fb51f84
Intelligence: 4 malware samples on MalwareBazaar are signed with this code signing certificate
Cert Graveyard Blocklist:This certificate is on the Cert Graveyard blocklist
Thumbprint Algorithm:SHA256
Thumbprint: 7d993675e1777962c02a956a2a6a517c0809c3b19f78705680e10fe01f63d9fe
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
95
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
pdfconvert.exe
Verdict:
Malicious activity
Analysis date:
2025-10-21 10:50:02 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
91.7%
Tags:
injection packed micro
Result
Verdict:
Clean
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the %temp% subdirectories
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Searching for synchronization primitives
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
installer-heuristic obfuscated packed signed
Verdict:
Clean
File Type:
exe x32
First seen:
2025-10-29T21:26:00Z UTC
Last seen:
2025-11-21T15:05:00Z UTC
Hits:
~10
Verdict:
inconclusive
YARA:
12 match(es)
Tags:
.Net Executable Fody/Costura Packer Managed .NET PDB Path PE (Portable Executable) PE File Layout SOS: 0.00 SOS: 0.15 SOS: 0.17 SOS: 0.18 SOS: 0.21 SOS: 0.22 SOS: 0.23 SOS: 0.24 SOS: 0.25 SOS: 0.26 SOS: 0.27 SOS: 0.28 Win 32 Exe x86
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
System Location Discovery: System Language Discovery
Loads dropped DLL
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
4bdcccc7b3b064e3b7b0477614fea345e88367a068acfb14c8abbf269f501028
MD5 hash:
7a61c0708077d04017e5d8cd3b455d54
SHA1 hash:
154fae80f7a8a515d401f4de206986af8f0f3074
SH256 hash:
ffd01614a8ddbc1307bd54748406e24fa43609519de5c37daa052b78662d5b84
MD5 hash:
45fa5c56b4c1329c0d0cfb76d2254ccf
SHA1 hash:
79fa474094db18933c29e9313bcc4bf68c38d363
SH256 hash:
9be838650af77a5cd342a44d4952b44b363b82b0003d52725f0198d80dd75e70
MD5 hash:
9d171688e160968aabc5711d432acb34
SHA1 hash:
01018741d989f403d92deb2a3141f69f025336c2
SH256 hash:
3bfee1db6a9891434c9132135eb56b8b5c80f41deadcf7cdaa831cce23797013
MD5 hash:
fa012ac613369e59184a9a5d637ef1e5
SHA1 hash:
0937fbc2b580105db4364029ee15aed16e2358bb
SH256 hash:
e63a9c9414570e7e649a797bd212867f4e4c766691c2415e5083f243bb183db0
MD5 hash:
8970048e95b9581fccd2fa2420ca88e5
SHA1 hash:
0fd704ad97d919464e786cac31d872683bd81416
SH256 hash:
207833c6dd510192d05bc8d297b16d5161379d968bed22d335b931078218c5cc
MD5 hash:
d9d55ce7c19ae971251d1d1dbdd8c320
SHA1 hash:
128bd75385106d94318c5d00269c2c7d6f175408
SH256 hash:
77f822fbd19f96a284e9d442821b393386511aa79a20e2d6d1558d87391227f3
MD5 hash:
795423cd6bd12e4a3780a8036d5b627b
SHA1 hash:
188cc003d569c9a3dace73d989576cc06cebe61d
SH256 hash:
b0ad8221143f3efe4d0b809df32403953a8e69f88a0b433fce22e3dd24c5f522
MD5 hash:
d7a024beb11cb2075c8363cedfa4bf64
SHA1 hash:
1c0c990c3e8c610d6a9c5e018a120753ac3086ff
SH256 hash:
095ff6419445942c954c56b60900cbc3ac57bcf8027aba2513e37c08df61ea87
MD5 hash:
1315bb43da985199f24bf010e54cbba2
SHA1 hash:
370dc0b612517503695c3378ee41f46d04f67b31
SH256 hash:
604e4fc2cc77731c50fe5cbbca528eb4c12ae31233e3476bd31d953d60883637
MD5 hash:
c6e6d13a6ceea8241d3c50ec8a1c77ee
SHA1 hash:
3a8b5ceed556a4a428390971201a2b411419a15f
SH256 hash:
0c971765793f74a9c593e728ca3424a9c964045b5be6d7ea6da79f7a24a82699
MD5 hash:
81c744454a02e3d869620f2a6d45df9d
SHA1 hash:
512d127e1b865822849d6476f661d76dcaa2cfe5
SH256 hash:
1764c46b9b21021eb38ba5eeeedcc41dcebb727fe986bf235a931818b2d4c945
MD5 hash:
0b3ea0befa836ec2d35c6bd59c134971
SHA1 hash:
5636bc9dcb8b770e57847008dbfda378c0860f69
SH256 hash:
5de9828d62b0bb3a2b2205b7dfe8554e12a222e39477d1344a9bdb8a8d19cb08
MD5 hash:
3058c68157a75ec731c1d6df0bef2b98
SHA1 hash:
5f1f19af9245b0820c9fdfe2c364c44337397e05
SH256 hash:
3bf12e244d9936e371c624ac571c9b221d3dee1a470cec84689e02bc291da677
MD5 hash:
0d24d59e6a3423c24933144f8afd45ce
SHA1 hash:
65b985ec9e6d6e2c5740a8486d923dd6392c7eb2
SH256 hash:
7f43a5f3fceadb52717ce7b623ccc8cada34ff07e26189dc7f673ffd054065f9
MD5 hash:
98706a573fa552bf3a774a5ca7736835
SHA1 hash:
6ad6cd19c2eaddf2b800266a67a7d237b22a460c
SH256 hash:
e64ff6bacdf65cf060f5d9423ac64c2de48fb9f46f8068e9e7bd9a2bb3893c25
MD5 hash:
56e685202b1788fce586d90bb76effa8
SHA1 hash:
780e58ee1419997f4b8924cdfc9fc822b97856b9
SH256 hash:
0cb5b8b06ca1dd120fe812ba85a9b487cd44dc696f984a1fb2f90c1e8ab48546
MD5 hash:
7e35f745a3677efa0cb1d38b0d56bba9
SHA1 hash:
8a635a115676e4322d6ba851cf1cdd55f8128473
SH256 hash:
48092f8fb2acdca3a18df8814386206ead18774a20f51c0a9a2f3e928f0bc38f
MD5 hash:
0d231bb7a265db2382ecbc3679e4bf94
SHA1 hash:
8af7011c24798098315cfe6d24f2492cb97d3c92
SH256 hash:
c00914c579a77c99c915cba0847961fc1f549aaa5be0874bb1c7b8ca1c451451
MD5 hash:
45d0b50ff9b4e22273f94c56e7ddd883
SHA1 hash:
a4930e1683ddbe5903883f3c4db1e2911ef5c456
SH256 hash:
cc927d8e2ad4718ab95cd000ceb6ff66a5e946e912a1b45f4a5047a920ea7abb
MD5 hash:
345387015bbbdf8d45187868d6ddb6bb
SHA1 hash:
d41dd3e44f4af8c99d5fcb9570ff207f7ccaa296
SH256 hash:
d5c2b5c02ae2f575c6b8f701182819d15789409e833aea9565c01a79c638af84
MD5 hash:
993b42b42fb9ca3a448061710571eca0
SHA1 hash:
d8bb53b430300aa817f8969a87db152ba383cdfc
SH256 hash:
3b8027a8b4ffaa798b617af63d2e5fa5b365b5aa815f42766ec24b008c5124ae
MD5 hash:
d4cf5d4050202902f51342c9b04cd434
SHA1 hash:
f03f2dcad9adeea516467fa3d1eebd093184ec68
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_EXE_Packed_Fody
Author:ditekSHen
Description:Detects executables manipulated with Fody
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments