MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 527222fc734cd8d10b481f7c6a2030e9f5ad50788aa45e0689b81ec32277aae2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 527222fc734cd8d10b481f7c6a2030e9f5ad50788aa45e0689b81ec32277aae2
SHA3-384 hash: 3aa9823d3696a46c51ae953ad3d75c3ba9122e500d8203c61c2ff0546e4b7e271d58158da079301182a8a188983b2d7a
SHA1 hash: 2377fcc4fc08e6cf81b54e94935552d84771958a
MD5 hash: b4fd01e2709e151ca8bb1ff19f86cc1c
humanhash: six-princess-apart-washington
File name:SecuriteInfo.com.Win64.MalwareX-gen.22329734
Download: download sample
File size:7'168 bytes
First seen:2026-01-09 14:24:45 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c2d02fc98f1d75d7b9457468ec75da0e (5 x Meterpreter)
ssdeep 12:eFGSGZAAt17NrH61O9B/FWr4Wk4G+8J4hyqhWyHawqhaEuIqH3mNk53O1pN:eFGSGmYpFQknehtht6dp5SokWp
TLSH T1C5E19C9AB71558B3FAAD07BF8287CBDAB2BD372043A6470C0550040855819197971F83
TrID 38.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
15.6% (.ICL) Windows Icons Library (generic) (2059/9)
15.4% (.EXE) OS/2 Executable (generic) (2029/13)
15.2% (.EXE) Generic Win/DOS Executable (2002/3)
15.2% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter SecuriteInfoCom
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
78
Origin country :
FR FR
Vendor Threat Intelligence
No detections
Malware family:
ID:
1
File name:
2to1ep.exe
Verdict:
Malicious activity
Analysis date:
2026-01-09 13:45:15 UTC
Tags:
auto metasploit framework python stealer stealc powershell barys github possible-phishing clickfix amadey botnet phishing miner salatstealer anti-evasion loader asyncrat rat havoc tool generic xenorat svc koistealer tinynuke guloader koiloader njrat meterpreter powershellempire cobaltstrike wannacry ransomware bruteratel coinminer cryptowall formbook azorult xworm pushware adware gh0st stealerium ghostsocks proxyware pyinstaller redline xred rhadamanthys whitesnakestealer remcos screenconnect rmm-tool rdp bladabindi purelogs neshta worm vidar donutloader clipper diamotrix remote gh0stcringe dcrat offloader lumma muckstealer quasar telegram deerstealer anydesk putty xmrig evasion whitesnake purecrypter hijackloader mimikatz pythonstealer websocket pastebin irc backdoor braodo eicar-test bdaejec schoolboy advancedinstaller meshagent credentialflusher netsupport arch-scr java blankgrabber autohotkey pchunter jeefo

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
microsoft_visual_cc packed rozena
Verdict:
Malicious
Labled as:
Win64/Rozena_AGeneric.GT trojan
Result
Gathering data
Verdict:
Unknown
File Type:
exe x64
First seen:
2026-01-09T11:26:00Z UTC
Last seen:
2026-01-09T11:26:00Z UTC
Hits:
~10
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Malware.Tedy
Status:
Malicious
First seen:
2026-01-09 14:03:51 UTC
File Type:
PE+ (Exe)
AV detection:
16 of 36 (44.44%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
527222fc734cd8d10b481f7c6a2030e9f5ad50788aa45e0689b81ec32277aae2
MD5 hash:
b4fd01e2709e151ca8bb1ff19f86cc1c
SHA1 hash:
2377fcc4fc08e6cf81b54e94935552d84771958a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Linux_Trojan_Metasploit_69e20012
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 527222fc734cd8d10b481f7c6a2030e9f5ad50788aa45e0689b81ec32277aae2

(this sample)

  
Delivery method
Distributed via web download

Comments