MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6ebc75fc7325f8795265b9b33eeb1776ee039d89d1b3ca5428a24b7131fffb8f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Arechclient2


Vendor detections: 14


Intelligence 14 IOCs YARA 7 File information Comments

SHA256 hash: 6ebc75fc7325f8795265b9b33eeb1776ee039d89d1b3ca5428a24b7131fffb8f
SHA3-384 hash: 1444047905123316b2a6e737d761f7bd8c9e2e8196b2192a44c7ee97bee6281b6070f6be87a184ec896a7992df28ec8d
SHA1 hash: f3e77cb0902d8d2baf27e7352c0b2e122e53b598
MD5 hash: 00877edf579df7d23893df4dc16de6e7
humanhash: mirror-michigan-angel-artist
File name:HAHOYKNL.exe.bin
Download: download sample
Signature Arechclient2
File size:2'508'659 bytes
First seen:2025-05-09 11:25:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b5a014d7eeb4c2042897567e1288a095 (19 x HijackLoader, 14 x ValleyRAT, 12 x LummaStealer)
ssdeep 49152:+pz3+IUNI9jqHnnOGbvdiB1RlAgbY1qrSsh2IJNxUp0:+pSnfnOGgB1PATkSscIJjUp0
Threatray 83 similar samples on MalwareBazaar
TLSH T14AC523117384ADF4E925C4329F5DE311E533E3AA2B455EC79B8A6E993FD3022060B2DD
TrID 38.7% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
24.6% (.EXE) Win64 Executable (generic) (10522/11/4)
11.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.5% (.EXE) Win32 Executable (generic) (4504/4/1)
4.7% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
dhash icon c292ecd8f2f6fe1c (15 x HijackLoader, 11 x LummaStealer, 7 x Arechclient2)
Reporter JAMESWT_WT
Tags:Arechclient2 exe verifyyourconnect-com

Intelligence


File Origin
# of uploads :
1
# of downloads :
419
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
mIL80IjI.ps1
Verdict:
Malicious activity
Analysis date:
2025-05-09 11:20:00 UTC
Tags:
hijackloader loader amsi-bypass

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
90.2%
Tags:
injection obfusc virus
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file in the %temp% directory
Launching cmd.exe command interpreter
Connecting to a non-recommended domain
Connection attempt
Unauthorized injection to a recently created process by context flags manipulation
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
adaptive-context fingerprint installer masquerade microsoft_visual_cc overlay overlay packed packer_detected
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.evad
Score:
88 / 100
Signature
Drops PE files to the user root directory
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Switches to a custom stack to bypass stack traces
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1685294 Sample: HAHOYKNL.exe.bin.exe Startdate: 09/05/2025 Architecture: WINDOWS Score: 88 60 Malicious sample detected (through community Yara rule) 2->60 62 Multi AV Scanner detection for submitted file 2->62 64 Yara detected RedLine Stealer 2->64 66 Joe Sandbox ML detected suspicious sample 2->66 9 HAHOYKNL.exe.bin.exe 13 2->9         started        13 TransacCor.exe 4 2->13         started        process3 file4 40 C:\Users\user\Wex.Logger.dll, PE32+ 9->40 dropped 42 C:\Users\user\Wex.Communication.dll, PE32+ 9->42 dropped 44 C:\Users\user\Wex.Common.dll, PE32+ 9->44 dropped 48 6 other malicious files 9->48 dropped 72 Drops PE files to the user root directory 9->72 15 TransacCor.exe 12 9->15         started        46 C:\Users\user\AppData\Local\...\6DCCA1E.tmp, PE32 13->46 dropped 74 Maps a DLL or memory area into another process 13->74 18 cmd.exe 1 13->18         started        20 VectFactory32.exe 1 13->20         started        signatures5 process6 file7 50 C:\ProgramData\Scancli_test\TransacCor.exe, PE32+ 15->50 dropped 52 C:\ProgramData\Scancli_test\Wex.Logger.dll, PE32+ 15->52 dropped 54 C:\ProgramData\...\Wex.Communication.dll, PE32+ 15->54 dropped 56 6 other files (none is malicious) 15->56 dropped 22 TransacCor.exe 5 15->22         started        26 conhost.exe 18->26         started        process8 file9 36 C:\ProgramData\VectFactory32.exe, PE32 22->36 dropped 38 C:\Users\user\AppData\Local\Temp\5048F1.tmp, PE32 22->38 dropped 68 Found hidden mapped module (file has been removed from disk) 22->68 70 Maps a DLL or memory area into another process 22->70 28 VectFactory32.exe 2 22->28         started        32 cmd.exe 3 22->32         started        signatures10 process11 dnsIp12 58 185.125.50.140, 443, 49693, 49695 INPLATLABS-ASRU Russian Federation 28->58 76 Switches to a custom stack to bypass stack traces 28->76 78 Found direct / indirect Syscall (likely to bypass EDR) 28->78 34 conhost.exe 32->34         started        signatures13 process14
Result
Malware family:
sectoprat
Score:
  10/10
Tags:
family:sectoprat discovery rat trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
SectopRAT
SectopRAT payload
Sectoprat family
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
6ebc75fc7325f8795265b9b33eeb1776ee039d89d1b3ca5428a24b7131fffb8f
MD5 hash:
00877edf579df7d23893df4dc16de6e7
SHA1 hash:
f3e77cb0902d8d2baf27e7352c0b2e122e53b598
SH256 hash:
a93c51a41133d308c8920856152efaa954ed6209c225d34c13d200c78869087c
MD5 hash:
4de5a1d0d7b55b3347543d28370d72a5
SHA1 hash:
fc694bac66ff21c2807f1f4940f64ef348120ffe
SH256 hash:
2588b1a116b466d257c79819ad5fe4707c5c252e15d61ae21a4205dcb9006ab2
MD5 hash:
ee044a80e70320afd7203fd782c9bdea
SHA1 hash:
aa1fa477f3fde24f26cb2498028f9f9323f545f5
SH256 hash:
3366c7905415b7b3d1dbdc2884fafd91ddc5337e5ccf116f571e8efd38cace78
MD5 hash:
63f49b5ed2ec05acfcb7b3896376ab1b
SHA1 hash:
383e053a7bc35317e464a75d5d484dd2a573c06a
SH256 hash:
35520faac853b0a2d088f35bd8055d7e4b9e2efdb66fe92dcc7e41b98944716c
MD5 hash:
1cdb3c7c4f74026dc99b4f6f699736a6
SHA1 hash:
7cff03fc72d5a15ce25fe169308837284e1e9900
SH256 hash:
4ff3fb6fa6eb83e2cac79812568e543029639a2e15bd13e4b01d9ab5a09659d2
MD5 hash:
9490dd8d0304db36ac66218afa5e5753
SHA1 hash:
b7edb377e9ce61d17bb344d0e490db257742324e
SH256 hash:
679ed1fca9b1e5b3e0b972c29cb4cad14d101ef92f52a4bc99a21dded3f14e42
MD5 hash:
ef33f7254d5c8e89d2f1c010d9eec345
SHA1 hash:
edc23bbc4426d318c84aa98a9dc6068e6ed3f2da
SH256 hash:
82748bde960a85d6d7b96abc112d60aeff23466cc3612b1170cb68148a6556f2
MD5 hash:
aeb45fb24cbd4aa116bb43e13d5a1218
SHA1 hash:
cee38a1662808c2fdc323f21fd302a0e5dd21ba0
SH256 hash:
a38f1489d911ab968a094b316a25a545e6d92a27ade26b9f0c97ce91a599e93d
MD5 hash:
b31d9a086b0633de5ef234080caf9c2b
SHA1 hash:
0f91dabecf6667cfe08d66565f46509a78375e90
SH256 hash:
b6bbf1bd2c7701667ff4f3de7ac69fd696c124c88d6ff662322c237f61d48992
MD5 hash:
c92138e57737052dd27e45c8b4a11786
SHA1 hash:
386592b5404d959b54e71fe70baf9457b805708c
SH256 hash:
f9c2491ef29c43b7261451a705a6e55acfbb46aa71d18a310ccd80ce793bc36d
MD5 hash:
cafa0272724f6559fb7b23aaa69614ae
SHA1 hash:
35bc60df7e75481340f9d7c7ea26283d1122f7cc
Malware family:
HijackLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:HeavensGate
Author:kevoreilly
Description:Heaven's Gate: Switch from 32-bit to 64-mode
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
ole32.dll::CreateStreamOnHGlobal
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteExW
SHELL32.dll::ShellExecuteW
SHELL32.dll::SHGetFileInfoW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetDriveTypeW
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetDiskFreeSpaceExW
KERNEL32.dll::GetCommandLineW
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::GetSystemDirectoryW
KERNEL32.dll::GetFileAttributesW
KERNEL32.dll::FindFirstFileW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::CreateWindowExW

Comments