MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 59b750a1d27f4e7684953ca218dfec0db190debfd4d6b73b065fb28993ac4b5c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
ConnectWise
Vendor detections: 15
| SHA256 hash: | 59b750a1d27f4e7684953ca218dfec0db190debfd4d6b73b065fb28993ac4b5c |
|---|---|
| SHA3-384 hash: | ba45ff0031679a14a1450aad0fe5b5226729259c6b810fb1273baddcf2f5ff57d5004d686b39514d0456495e82709c7d |
| SHA1 hash: | 5d16f16cab4807dc656960c449ecda20975cf81f |
| MD5 hash: | 822c8bdfa497a71b5d9700a8d1a95e76 |
| humanhash: | mike-oven-solar-florida |
| File name: | 59b750a1d27f4e7684953ca218dfec0db190debfd4d6b73b065fb28993ac4b5c |
| Download: | download sample |
| Signature | ConnectWise |
| File size: | 11'904'056 bytes |
| First seen: | 2026-04-20 08:41:28 UTC |
| Last seen: | 2026-04-20 08:46:52 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 9771ee6344923fa220489ab01239bdfd (384 x ConnectWise) |
| ssdeep | 196608:nfefPn9Hm9R0AnJZSHm9R0AXHm9R0A/Hm9R0A3:T5ZZmuH |
| Threatray | 2'064 similar samples on MalwareBazaar |
| TLSH | T147C61201B3E565B5E0BF0A38E87A42656A75BC049712C2BF5394B96D3D32BC09E32773 |
| TrID | 29.5% (.EXE) Win64 Executable (generic) (6522/11/2) 22.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 20.3% (.EXE) Win32 Executable (generic) (4504/4/1) 9.1% (.EXE) OS/2 Executable (generic) (2029/13) 9.0% (.EXE) Generic Win/DOS Executable (2002/3) |
| Magika | pebin |
| Reporter | |
| Tags: | 185-80-234-36 ConnectWise exe instance-hirb01-relay-screenconnect-com signed |
Code Signing Certificate
| Organisation: | ConnectWise, LLC |
|---|---|
| Issuer: | DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 |
| Algorithm: | sha256WithRSAEncryption |
| Valid from: | 2025-06-23T00:00:00Z |
| Valid to: | 2028-06-22T23:59:59Z |
| Serial number: | 0abbca120c79810a182f72f89c04358f |
| Intelligence: | 211 malware samples on MalwareBazaar are signed with this code signing certificate |
| Thumbprint Algorithm: | SHA256 |
| Thumbprint: | b7902a93876909ba13bc23013f2c4239db57bfe742f500766a1673c5199fd1fb |
| Source: | This information was brought to you by ReversingLabs A1000 Malware Analysis Platform |
Intelligence
File Origin
ITVendor Threat Intelligence
Details
Result
Behaviour
Result
Behaviour
Unpacked files
433ec15200c20d2d70f26f753897dd71c53362814f8fe2966a10b0cfcdb8a4e5
be07912f9798791f9ff3134fc5edecfae4c455588e6306f54eed6e720f38a2ca
59b750a1d27f4e7684953ca218dfec0db190debfd4d6b73b065fb28993ac4b5c
bf70651adae1db15cd799bfe05ed0686dfb0a3fc7454cd8836ea4dd2543e4b27
6380418228eeb94248b850f1baa05be12104120dc0e8ef0c50d72891318ab04d
433ec15200c20d2d70f26f753897dd71c53362814f8fe2966a10b0cfcdb8a4e5
be07912f9798791f9ff3134fc5edecfae4c455588e6306f54eed6e720f38a2ca
59b750a1d27f4e7684953ca218dfec0db190debfd4d6b73b065fb28993ac4b5c
bf70651adae1db15cd799bfe05ed0686dfb0a3fc7454cd8836ea4dd2543e4b27
6380418228eeb94248b850f1baa05be12104120dc0e8ef0c50d72891318ab04d
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CP_Script_Inject_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | Detects attempts to inject code into another process across PE, ELF, Mach-O binaries |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | INDICATOR_EXE_DotNET_Encrypted |
|---|---|
| Author: | ditekSHen |
| Description: | Detects encrypted or obfuscated .NET executables |
| Rule name: | INDICATOR_RMM_ConnectWise_ScreenConnect |
|---|---|
| Author: | ditekSHen |
| Description: | Detects ConnectWise Control (formerly ScreenConnect). Review RMM Inventory |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | telebot_framework |
|---|---|
| Author: | vietdx.mb |
| Rule name: | TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE |
|---|---|
| Author: | CYFARE |
| Description: | Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments |
| Reference: | https://cyfare.net/ |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.