MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 778e957d75bc317eda0c29175cba9ddb644a6e33ce80acabead572d1ccde8a9c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SyncroRMM


Vendor detections: 12


Intelligence 12 IOCs YARA 9 File information Comments

SHA256 hash: 778e957d75bc317eda0c29175cba9ddb644a6e33ce80acabead572d1ccde8a9c
SHA3-384 hash: 1f19388d3002267950f3131881b45a530772b3eac4d04fff4d1122c33e399320472ff81bf6c1da17ec9eda84e05a1dc7
SHA1 hash: b7a67558c5d3633bbdb586a3a7bfc52a09f0359a
MD5 hash: d771fb0a8244d48bc238e96681fd224b
humanhash: nebraska-fix-edward-neptune
File name:file
Download: download sample
Signature SyncroRMM
File size:5'858'856 bytes
First seen:2026-04-01 21:51:20 UTC
Last seen:2026-04-02 00:01:58 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'855 x AgentTesla, 19'783 x Formbook, 12'304 x SnakeKeylogger)
ssdeep 98304:Uh/evJLeTmDDi9UeK7kqXf0FGxLCbD3ha5Uc6v6O3xUM3/L9LI/cbt7/Cp/z2OIn:Uh/ev5eTeW90kSIbDoUcfOhzT9cEt720
Threatray 65 similar samples on MalwareBazaar
TLSH T1EF461204F7A5061DF466FAF62D21711146B3BE479815C649E3B33088EA76E43CE6C2EE
TrID 70.4% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.2% (.EXE) Win64 Executable (generic) (6522/11/2)
4.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon c433d9b2666931d4 (29 x SyncroRMM)
Reporter Bitsight
Tags:dropped-by-gcleaner e exe signed SyncroRMM US.file

Code Signing Certificate

Organisation:Servably Inc.
Issuer:DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
Algorithm:sha256WithRSAEncryption
Valid from:2024-05-06T00:00:00Z
Valid to:2027-05-05T23:59:59Z
Serial number: 0dfad4ca18767f45b3c9fc7565395709
Intelligence: 36 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 456e86fa9b5113d50debcfd1b8d0d53642e72522351c5f9b1a975caaf4391cd6
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
Bitsight
url: http://158.94.209.95/service

Intelligence


File Origin
# of uploads :
6
# of downloads :
123
Origin country :
US US
Vendor Threat Intelligence
Gathering data
Malware family:
n/a
ID:
1
File name:
_778e957d75bc317eda0c29175cba9ddb644a6e33ce80acabead572d1ccde8a9c.exe
Verdict:
Malicious activity
Analysis date:
2026-04-01 21:52:53 UTC
Tags:
syncro rmm-tool websocket splashtop

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a window
Sending a custom TCP request
DNS request
Connection attempt
Sending an HTTP GET request
Creating a file in the Program Files subdirectories
Using the Windows Management Instrumentation requests
Running batch commands
Launching a process
Loading a suspicious library
Creating a service
Launching a service
Searching for synchronization primitives
Moving a recently created file
Searching for the window
Unauthorized injection to a recently created process
Enabling autorun for a service
Unauthorized injection to a system process
Verdict:
Adware
File Type:
exe x32
Detections:
not-a-virus:HEUR:RemoteAdmin.MSIL.Syncro.gen
Malware family:
RepairTech, Inc.
Verdict:
Unknown
Verdict:
Malware
YARA:
11 match(es)
Tags:
.Net Executable Fody/Costura Packer Managed .NET PDB Path PE (Portable Executable) PE File Layout PowerShell SOS: 0.00 SOS: 0.01 SOS: 0.03 SOS: 0.07 SOS: 0.09 SOS: 0.11 SOS: 0.12 SOS: 0.13 SOS: 0.14 SOS: 0.15 SOS: 0.17 SOS: 0.18 SOS: 0.19 SOS: 0.20 SOS: 0.21 SOS: 0.22 SOS: 0.23 SOS: 0.24 SOS: 0.25 SOS: 0.26 SOS: 0.27 SOS: 0.28 SOS: 0.29 SOS: 0.30 SOS: 0.31 SOS: 0.32 SOS: 0.33 SOS: 0.35 SOS: 0.39 SOS: 0.51 SOS: 0.68 SOS: 0.73 Win 32 Exe x86
Threat name:
Win32.Trojan.Qwexlafiba
Status:
Malicious
First seen:
2026-04-01 21:52:30 UTC
File Type:
PE (.Net Exe)
Extracted files:
54
AV detection:
6 of 23 (26.09%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
bootkit defense_evasion discovery persistence privilege_escalation upx
Behaviour
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Checks installed software on the system
Drops file in Program Files directory
Drops file in Windows directory
Executes dropped EXE
Launches sc.exe
Loads dropped DLL
Checks computer location settings
Drops file in System32 directory
Event Triggered Execution: Component Object Model Hijacking
UPX packed file
Badlisted process makes network request
Downloads MZ/PE file
Enumerates connected drives
Writes to the Master Boot Record (MBR)
Sets service image path in registry
Unpacked files
SH256 hash:
778e957d75bc317eda0c29175cba9ddb644a6e33ce80acabead572d1ccde8a9c
MD5 hash:
d771fb0a8244d48bc238e96681fd224b
SHA1 hash:
b7a67558c5d3633bbdb586a3a7bfc52a09f0359a
SH256 hash:
19e056ddd620509caaf0956733b54b0e6c32b6efe769dfd9339474d15040591b
MD5 hash:
086cdbfc04719a1f95ce1b5736bf66e3
SHA1 hash:
117aa6c4472cce6b281ff05f263b445ebd84d464
SH256 hash:
ef093e8f560e174527fef186b4f4c605837a93027deab3ae22b629f614f1025f
MD5 hash:
ea42ef163c3ed37fa0c4c92f9655c71e
SHA1 hash:
68b251ea1b66e9f463549b1a8256130b7362ee66
SH256 hash:
1cc99f966141345362bb36079ecb08bda543a3060ef344733223ab9ad7d91fea
MD5 hash:
5b6fb9a0d3b59fbb07af1930ce38b77d
SHA1 hash:
b8d2f35e8db20d54b7ceade2fd8714d523fe7a2e
Detections:
INDICATOR_EXE_Packed_Fody
Parent samples :
c3a6503b3e50a346369dbc5366d33930991791b17319590400425a210c2f7a5f
d084130d0d3897bf78559509e8a2d344632154d0a369f1aba53fd9a912d7eb51
12b9b79a09bb0fe7055e2c4d8d9d0a8291d20a005284378d498709f4ce8a4b00
b916bc643d180a36bc60f70ca063988ac5f568e56ceae372f55f313097750989
e4e31b07b240c202b2912730a926b494a5984f3ba6c706ffc80015262c158f04
acc6721dbddad55c6a76b460a8a53bc5d4e97d00990e4cac686b2ab2877e1a91
d2c37690d6c4fc2cfa348ce7f7837433c55315b96b4c9f767a32ad7fa9233246
649111dc3d49e65fdc664e7b59555818846159173015df71bf98f0bc4b5a50c3
c683ea7e57cb9ff91393da0b28371863f315421b03905da49474e1382b441759
5902640be1d1e83848e2ba869e5acbf8317470993943c237666b7dc617ed8628
b2b573bb2249e8aa4a7799af694d0b56ec6748602476bf09061a2dea038303cf
01dc573ef5281f437fc225ccb0b47e2b5a54802b6f43798137be90ca5ef3ca52
169e6b98a8d3a011105f9962c01c8e52fd42c53ece11e81d9b22407f522aeada
06431dede3bc353da8da322364c87c973ad132d0e921356af5f677e91b05fa7f
165ad7a1453482031c26be0f52730d31cc6f3a9d5a67233dcdce698de34ae6f5
0d9a2fdbaca26cd3bfcb6123b1434a00815e3faf7325035bc654ba5ba5413afa
cfaa0dfa8af6f986d348ae402fb519fd2dc59b63a01f400c16136273d721d290
382c8a88a4c8cec1bc85a835aca0a9ef93fa8f0788b250f00ebb64114c4ce1e5
fb1f8d24294cafcfc7e00d4f3a90bdec6bb312b21cbbb577950fa8decc819275
778e957d75bc317eda0c29175cba9ddb644a6e33ce80acabead572d1ccde8a9c
16fcea9cd0ef8a938844eef02a00ee9a92d64bee83456e5e204179b093619b07
4d6fa2e2bc8964159cf4bbd71095dbb3cc7e9ffa91a9416c2b96970d3615e064
aeeeda70cbbea0074f171b0da50aead64e9280d94e95714263d47d720eb7c71c
aa074b990ef39f77e3d07f2a3ead60e1d87b5c073ea6ec5e3760356d131cd15f
2816414c2fcfa443d614b66be879dcce5ed506bd816334911954ce3ce8213aac
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_EXE_Packed_Fody
Author:ditekSHen
Description:Detects executables manipulated with Fody
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

SyncroRMM

Executable exe 778e957d75bc317eda0c29175cba9ddb644a6e33ce80acabead572d1ccde8a9c

(this sample)

  
Dropped by
Gcleaner
  
Delivery method
Distributed via web download

Comments