MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6ce53bd0d75f8f9396bdcdce88e88f9d891ad65eb1de384ef406c7c7a82904c4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: 6ce53bd0d75f8f9396bdcdce88e88f9d891ad65eb1de384ef406c7c7a82904c4
SHA3-384 hash: 138238f8e7b9bb21fc84ec176340b54a4c55aca69b6ed0eeab4c4c22546482221f8a5ccad9e38ed1b72031eeec478213
SHA1 hash: 6bdb407261d8d63c4236aef98da03beca4466ee3
MD5 hash: c07a6f998c2f1abfc0b4ac32733db0c8
humanhash: winner-harry-alanine-princess
File name:file
Download: download sample
File size:5'541'904 bytes
First seen:2025-12-19 00:21:40 UTC
Last seen:2025-12-19 02:18:41 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4fa8ff63c5af0930927fa86f5dc8801d
ssdeep 98304:Ix6AmU2cgWuTpNKHtltJfKoKZxVdiUZbKwzdMEzZOze74L2A90qQJO:zlWuaNNfKzLVgwBHQzesLJSw
Threatray 1 similar samples on MalwareBazaar
TLSH T1874633073E817B84D8093A7DF60B7A4ABC55B837DDD11B69CC5935C18C3AE20DABB960
TrID 45.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
18.3% (.EXE) OS/2 Executable (generic) (2029/13)
18.0% (.EXE) Generic Win/DOS Executable (2002/3)
18.0% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter Bitsight
Tags:dropped-by-amadey exe fbf543


Avatar
Bitsight
url: http://178.16.52.82/uee8j1iclu.exe

Intelligence


File Origin
# of uploads :
5
# of downloads :
147
Origin country :
US US
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
_6ce53bd0d75f8f9396bdcdce88e88f9d891ad65eb1de384ef406c7c7a82904c4.exe
Verdict:
No threats detected
Analysis date:
2025-12-19 00:22:56 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
95.7%
Tags:
virus
Result
Verdict:
Clean
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the %temp% directory
DNS request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
crypto microsoft_visual_cc obfuscated packed packed themidawinlicense unsafe
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-12-18T21:37:00Z UTC
Last seen:
2025-12-19T12:48:00Z UTC
Hits:
~10
Detections:
Trojan-PSW.Win64.ChromeInject.sb Trojan-PSW.Win64.ChromeInject.ta
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 64 Exe x64
Verdict:
Malicious
Threat:
Trojan-PSW.Win64.ChromeInject
Threat name:
Win64.Trojan.Hack
Status:
Malicious
First seen:
2025-12-19 00:22:18 UTC
File Type:
PE+ (Exe)
Extracted files:
8
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
genericransomware
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig collection defense_evasion discovery execution exploit impact miner persistence ransomware spyware stealer themida trojan
Behaviour
Delays execution with timeout.exe
Interacts with shadow copies
Modifies data under HKEY_USERS
Runs net.exe
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy service COM API
outlook_office_path
outlook_win_path
Browser Information Discovery
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks whether UAC is enabled
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
Indicator Removal: File Deletion
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Power Settings
Checks BIOS information in registry
Cryptocurrency Miner
Disables service(s)
Executes dropped EXE
Modifies file permissions
Reads WinSCP keys stored on the system
Reads user/profile data of web browsers
Stops running service(s)
Themida packer
Command and Scripting Interpreter: PowerShell
Downloads MZ/PE file
Possible privilege escalation attempt
Deletes shadow copies
Identifies VirtualBox via ACPI registry values (likely anti-VM)
XMRig Miner payload
Modifies Windows Defender notification settings
Xmrig family
xmrig
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
6ce53bd0d75f8f9396bdcdce88e88f9d891ad65eb1de384ef406c7c7a82904c4
MD5 hash:
c07a6f998c2f1abfc0b4ac32733db0c8
SHA1 hash:
6bdb407261d8d63c4236aef98da03beca4466ee3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_Themida
Author:ditekSHen
Description:Detects executables packed with Themida
Rule name:pe_detect_tls_callbacks

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 6ce53bd0d75f8f9396bdcdce88e88f9d891ad65eb1de384ef406c7c7a82904c4

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

Comments