MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5b573de08c6980957556c94666e81544cdb0d084e9e880cb32c937a851274930. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: 5b573de08c6980957556c94666e81544cdb0d084e9e880cb32c937a851274930
SHA3-384 hash: e31819074258ebf42704995e63fc52e1d6ce6216315b5a6b28f457a089370b0ec130ce71780393e489e8dd13064bfafd
SHA1 hash: 9121ada83bf018df8e0a862779265206298b8d0e
MD5 hash: ff7a39165bdf039d0692ae57b4c953a8
humanhash: carolina-kitten-india-johnny
File name:5b573de08c6980957556c94666e81544cdb0d084e9e880cb32c937a851274930.jar
Download: download sample
File size:19'168'262 bytes
First seen:2026-03-17 13:58:50 UTC
Last seen:Never
File type:Java file jar
MIME type:application/zip
ssdeep 393216:KKk3pLij1JldZv8mBK4AdE65yvWId2z4YasB7OP:KKk5Lij1JtblAdE6AWIdC4a7q
TLSH T15617F1F67D85E665DA67A73690918063742823F9940BF02F01BCCD8A4C62C963752FEE
TrID 77.1% (.JAR) Java Archive (13500/1/2)
22.8% (.ZIP) ZIP compressed archive (4000/1)
Magika apk
Reporter JAMESWT_WT
Tags:jar signed SugarSMP

Code Signing Certificate

Organisation:Microsoft Corporation
Issuer:Microsoft Corporation
Algorithm:sha384WithRSAEncryption
Valid from:2026-02-16T23:55:40Z
Valid to:2026-05-17T23:55:40Z
Serial number: 487a4e0af72ff52d
Thumbprint Algorithm:SHA256
Thumbprint: 00bbbe1e058b112230ae32bd1ca50ea1ab6ff33039a4cefaa2b5b6622f92c897
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
69
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
5b573de08c6980957556c94666e81544cdb0d084e9e880cb32c937a851274930.jar
Verdict:
No threats detected
Analysis date:
2026-03-17 13:59:50 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm bash evasive lolbin macros-on-close wmic
Verdict:
Malicious
File Type:
jar
Detections:
HEUR:Trojan-PSW.Java.Stealer.gen HEUR:Trojan-PSW.Java.Generic
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion
Behaviour
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Contacts third-party web service commonly abused for C2
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:telebot_framework
Author:vietdx.mb

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments