MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 72acf597de6ade41537a8d9d153e89064168ed780feeffc66ecf3081922fd87d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



HijackLoader


Vendor detections: 13


Intelligence 13 IOCs YARA 6 File information Comments

SHA256 hash: 72acf597de6ade41537a8d9d153e89064168ed780feeffc66ecf3081922fd87d
SHA3-384 hash: 0ded7d6434f31f0f0324fb9f452cde6e5628042fd2af914424356522051463c8e72e988c824b8fd13c4c1202d89480c2
SHA1 hash: e210e6c1003f00b17b2e1eaf14ac23d3db3e4115
MD5 hash: 7c66d1e0eb11a7bfb1dd0e3933e9f250
humanhash: nebraska-nitrogen-indigo-arizona
File name:OGIUVPWU.msi
Download: download sample
Signature HijackLoader
File size:3'362'816 bytes
First seen:2025-09-11 14:25:33 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 49152:09o+4mkeV67QyNcn5LeDCWzzENIdJKJzI2+PsAxbmbQ6aHP9+ETifxb+EbHWdKZO:s4jeI7QJn5iSejPsxXaH1Wfx6CvU
Threatray 106 similar samples on MalwareBazaar
TLSH T188F53337E580C7E3D1E6AC78AD046D5E1A91FC9E53DE14AAB98B34409CB18C833D5E6C
TrID 88.4% (.MST) Windows SDK Setup Transform script (61000/1/5)
11.5% (.) Generic OLE2 / Multistream Compound (8000/1)
Magika msi
Reporter aachum
Tags:80-253-249-210 booking HIjackLoader invitation-confirm-com msi


Avatar
iamaachum
https://invitation-confirm.com/rad/OGIUVPWU.msi

Intelligence


File Origin
# of uploads :
1
# of downloads :
35
Origin country :
ES ES
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug expired-cert fingerprint installer wix
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
File Type:
msi
First seen:
2025-09-11T11:55:00Z UTC
Last seen:
2025-09-11T11:55:00Z UTC
Hits:
~10
Detections:
Trojan.Win32.Strab.sb Trojan.Win32.Penguish.sb Trojan.Win32.Injector.sb Trojan.Win32.Inject.sb Trojan.Win32.Crypt.sb Trojan.Win32.Agent.sb Trojan.Win64.SBEscape.sb UDS:DangerousObject.Multi.Generic HEUR:Trojan.OLE2.Alien.gen HEUR:Trojan.Win32.Agent.gen
Result
Threat name:
HijackLoader
Detection:
malicious
Classification:
troj.evad
Score:
84 / 100
Signature
Contains functionality to infect the boot sector
Drops PE files to the user root directory
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Switches to a custom stack to bypass stack traces
Yara detected HijackLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1775692 Sample: OGIUVPWU.msi Startdate: 11/09/2025 Architecture: WINDOWS Score: 84 43 Found malware configuration 2->43 45 Yara detected HijackLoader 2->45 9 msiexec.exe 78 38 2->9         started        12 msiexec.exe 3 2->12         started        process3 file4 35 C:\Users\user\AppData\...\PipeDebug52.exe, PE32 9->35 dropped 37 C:\Users\user\AppData\Local\...\BugSplat.dll, PE32 9->37 dropped 14 PipeDebug52.exe 5 9->14         started        process5 file6 39 C:\ProgramDatabehaviorgraphRL_Auth1\PipeDebug52.exe, PE32 14->39 dropped 41 C:\ProgramDatabehaviorgraphRL_Auth1\BugSplat.dll, PE32 14->41 dropped 61 Switches to a custom stack to bypass stack traces 14->61 63 Found direct / indirect Syscall (likely to bypass EDR) 14->63 18 PipeDebug52.exe 7 14->18         started        signatures7 process8 file9 29 C:\Users\user\XOrchestrator.exe, PE32+ 18->29 dropped 31 C:\Users\user\AppData\Roaming\...\Chime.exe, PE32 18->31 dropped 33 C:\Users\user\AppData\Local\...\F692ADD.tmp, PE32+ 18->33 dropped 47 Drops PE files to the user root directory 18->47 49 Modifies the context of a thread in another process (thread injection) 18->49 51 Found hidden mapped module (file has been removed from disk) 18->51 53 3 other signatures 18->53 22 XOrchestrator.exe 18->22         started        25 Chime.exe 18->25         started        signatures10 process11 signatures12 55 Contains functionality to infect the boot sector 22->55 57 Found direct / indirect Syscall (likely to bypass EDR) 22->57 27 WerFault.exe 2 22->27         started        59 Switches to a custom stack to bypass stack traces 25->59 process13
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
CAB:COMPRESSION:LZX Executable Office Document PDB Path PE (Portable Executable) PE File Layout PE Memory-Mapped (Dump)
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-09-11 14:30:56 UTC
File Type:
Binary (Archive)
Extracted files:
38
AV detection:
9 of 38 (23.68%)
Threat level:
  5/5
Result
Malware family:
hijackloader
Score:
  10/10
Tags:
family:hijackloader discovery loader persistence privilege_escalation ransomware
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Event Triggered Execution: Installer Packages
System Location Discovery: System Language Discovery
Drops file in Windows directory
Executes dropped EXE
Loads dropped DLL
Suspicious use of SetThreadContext
Enumerates connected drives
Detects HijackLoader (aka IDAT Loader)
HijackLoader
Hijackloader family
Suspicious use of NtCreateUserProcessOtherParentProcess
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Malware family:
IDATLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:Windows_Trojan_GhostPulse_caea316b
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

HijackLoader

Microsoft Software Installer (MSI) msi 72acf597de6ade41537a8d9d153e89064168ed780feeffc66ecf3081922fd87d

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

Comments