MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 75485847e431dddea1d9aee4cbc49066defc4fa8347cda67835009ca7d95b799. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ThunderShell


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: 75485847e431dddea1d9aee4cbc49066defc4fa8347cda67835009ca7d95b799
SHA3-384 hash: e20e9da4005f4ce96a38529e90d7b344129e4b52f25806cf278a1f3cc825cacefbd15dfa784f7ac5e76e9a48ee7d99a0
SHA1 hash: 8a1203beb38115a0bc4e59308d3057fb63611cce
MD5 hash: b3fefeae38cdf3e651ac6389bf5f12ef
humanhash: white-snake-december-summer
File name:RV-tools-4.8.0.exe
Download: download sample
Signature ThunderShell
File size:44'874'280 bytes
First seen:2025-12-04 19:36:37 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 46ce5c12b293febbeb513b196aa7f843 (20 x GuLoader, 12 x RemcosRAT, 5 x VIPKeylogger)
ssdeep 786432:TDcNVAFe6xquU3k+VixLB4WofnK0a3GDts4ic1YTe0grV4Klb:TgNaLUfuLBUnKT3GDts+qy0g4Gb
Threatray 6 similar samples on MalwareBazaar
TLSH T1E3A7337A151CF323F0ABC6BA17371F5458B405BBD1B569E37E92D43A9C8C3A2C0A5847
TrID 37.3% (.EXE) Win64 Executable (generic) (10522/11/4)
17.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
15.9% (.EXE) Win32 Executable (generic) (4504/4/1)
7.3% (.ICL) Windows Icons Library (generic) (2059/9)
7.2% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'794 x Socks5Systemz, 67 x RedLineStealer)
Reporter smica83
Tags:exe signed ThunderShell

Code Signing Certificate

Organisation:WEGUN (THAILAND) CO., LTD.
Issuer:GlobalSign GCC R45 EV CodeSigning CA 2020
Algorithm:sha256WithRSAEncryption
Valid from:2025-12-02T18:27:10Z
Valid to:2026-11-21T02:29:46Z
Serial number: 5a076b593c5e7dca24430353
Cert Graveyard Blocklist:This certificate is on the Cert Graveyard blocklist
Thumbprint Algorithm:SHA256
Thumbprint: ec6236b5ddcede11ad083ef8428440da499bdf2bbacdda240b255511f3b39995
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
118
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
RV-tools-4.8.0.exe
Verdict:
Malicious activity
Analysis date:
2025-12-04 19:38:53 UTC
Tags:
python auto-reg arch-exec arch-doc

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
adaptive-context anti-debug blackhole installer installer installer-heuristic microsoft_visual_cc nsis overlay signed
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-12-04T13:50:00Z UTC
Last seen:
2025-12-06T09:26:00Z UTC
Hits:
~10
Detections:
UDS:DangerousObject.Multi.Generic
Result
Threat name:
ThunderShell
Detection:
malicious
Classification:
expl.evad.troj
Score:
44 / 100
Signature
Document exploit detected (process start blacklist hit)
Multi AV Scanner detection for submitted file
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Suspicious Microsoft Office Child Process
Suricata IDS alerts for network traffic
Unusual module load detection (module proxying)
Yara detected ThunderShell
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1826727 Sample: RV-tools-4.8.0.exe Startdate: 04/12/2025 Architecture: WINDOWS Score: 44 76 square-wave-65dd.api-gateway-a3f.workers.dev 2->76 78 divine-glitter-cfb4.elena-morales.workers.dev 2->78 80 2 other IPs or domains 2->80 100 Suricata IDS alerts for network traffic 2->100 102 Multi AV Scanner detection for submitted file 2->102 104 Yara detected ThunderShell 2->104 106 2 other signatures 2->106 10 RV-tools-4.8.0.exe 2 455 2->10         started        13 WINWORD.EXE 2->13         started        15 msiexec.exe 2->15         started        signatures3 process4 file5 64 C:\ProgramData\Microsoft\...\WINWORD.EXE, PE32+ 10->64 dropped 66 C:\ProgramData\...\UsbServiceBroker.exe, PE32+ 10->66 dropped 68 C:\ProgramData\...\UsbServiceBroker.exe, PE32+ 10->68 dropped 70 173 other files (1 malicious) 10->70 dropped 17 WINWORD.EXE 1 10->17         started        20 msiexec.exe 17 10->20         started        24 sc.exe 1 10->24         started        26 sc.exe 1 10->26         started        28 UsbServiceBroker.exe 13->28         started        30 msiexec.exe 1 1 15->30         started        process6 dnsIp7 86 Document exploit detected (process start blacklist hit) 17->86 32 UsbServiceBroker.exe 24 17->32         started        82 ocsp.comodoca.com.cdn.cloudflare.net 104.18.38.233, 49692, 80 CLOUDFLARENETUS United States 20->82 60 C:\Users\user\AppData\Local\...\MSIFC95.tmp, PE32 20->60 dropped 62 C:\Users\user\AppData\Local\...\MSIF05F.tmp, PE32 20->62 dropped 37 conhost.exe 24->37         started        39 conhost.exe 26->39         started        84 square-wave-65dd.api-gateway-a3f.workers.dev 104.21.73.194, 443, 49700 CLOUDFLARENETUS United States 28->84 88 Unusual module load detection (module proxying) 28->88 90 Reads the Security eventlog 28->90 92 Reads the System eventlog 28->92 41 csc.exe 28->41         started        43 WmiPrvSE.exe 30->43         started        file8 signatures9 process10 dnsIp11 74 divine-glitter-cfb4.elena-morales.workers.dev 104.21.48.116, 443, 49699 CLOUDFLARENETUS United States 32->74 56 C:\Users\user\AppData\...\l5jnnrpc.cmdline, Unicode 32->56 dropped 94 Unusual module load detection (module proxying) 32->94 96 Reads the Security eventlog 32->96 98 Reads the System eventlog 32->98 45 csc.exe 32->45         started        58 C:\Users\user\AppData\Local\...\gdxfta1d.dll, PE32 41->58 dropped 48 conhost.exe 41->48         started        50 cvtres.exe 41->50         started        file12 signatures13 process14 file15 72 C:\Users\user\AppData\Local\...\l5jnnrpc.dll, PE32 45->72 dropped 52 conhost.exe 45->52         started        54 cvtres.exe 45->54         started        process16
Gathering data
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2025-12-04 19:38:28 UTC
File Type:
PE (Exe)
Extracted files:
48326
AV detection:
14 of 38 (36.84%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery persistence ransomware
Behaviour
Checks SCSI registry key(s)
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Adds Run key to start application
Badlisted process makes network request
Enumerates connected drives
Executes dropped EXE
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Detect_NSIS_Nullsoft_Installer
Author:Obscurity Labs LLC
Description:Detects NSIS installers by .ndata section + NSIS header string
Rule name:PE_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments