MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7f37e85103beaf87529dce079b920489289c0c11052bf8de3ef0e846d8852945. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 12


Intelligence 12 IOCs YARA 3 File information Comments

SHA256 hash: 7f37e85103beaf87529dce079b920489289c0c11052bf8de3ef0e846d8852945
SHA3-384 hash: 5cadeea425224d8cf1e68e0d1cee8123799c6c1a000cd42e3d519ae349033b81acd25d7917d2393de4aa4a5fce979b52
SHA1 hash: ea4c54cb54703f2dbefabfb79c71f401635da05c
MD5 hash: fdecf2c297084d9ee0af977349993ec5
humanhash: indigo-mango-october-fruit
File name:fdecf2c297084d9ee0af977349993ec5.exe
Download: download sample
File size:3'775'488 bytes
First seen:2026-02-27 16:41:46 UTC
Last seen:2026-02-27 17:42:20 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 8da0e8ff9b93f7f3227639b88e7bb4ab
ssdeep 98304:kZio1rt1GxI9lad5Ul7XTTSI7oF86ouPh3:kIoRDGV5YbTTRI8oPh
TLSH T19B06235A3BCB0AB1D41FCFB1C69564BD70797BC18C25DC5EB6C8664C5EA32086EB2306
TrID 33.6% (.EXE) OS/2 Executable (generic) (2029/13)
33.1% (.EXE) Generic Win/DOS Executable (2002/3)
33.1% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
96
Origin country :
SE SE
Vendor Threat Intelligence
No detections
Malware family:
ID:
1
File name:
fdecf2c297084d9ee0af977349993ec5.exe
Verdict:
Malicious activity
Analysis date:
2026-02-27 16:46:56 UTC
Tags:
xmrig miner auto-sch crypto-regex

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
81.4%
Tags:
malware
Verdict:
Malicious
File Type:
exe x64
Detections:
Trojan-Banker.Win32.Express.sb Trojan-Banker.Win32.ClipBanker.sb Trojan.Win32.Tasker.bjkt Trojan.Win32.Agent.rnd PDM:Trojan.Win32.Tasker.cust PDM:Trojan.Win32.Generic Trojan-Dropper.Win32.Injector.sb
Result
Threat name:
MicroClip
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Potential Privilege Escalation using Task Scheduler highest RunLevel
Self deletion via cmd or bat file
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect debuggers (CloseHandle check)
Tries to evade analysis by execution special instruction (VM detection)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected MicroClip
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1876073 Sample: Lk8l39r3zd.exe Startdate: 27/02/2026 Architecture: WINDOWS Score: 100 48 Multi AV Scanner detection for submitted file 2->48 50 Yara detected MicroClip 2->50 52 PE file contains section with special chars 2->52 54 2 other signatures 2->54 7 Lk8l39r3zd.exe 1 2 2->7         started        11 erepxtpidjtw.exe 2->11         started        process3 file4 46 C:\ProgramData\...\erepxtpidjtw.exe, PE32+ 7->46 dropped 56 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 7->56 58 Self deletion via cmd or bat file 7->58 60 Uses schtasks.exe or at.exe to add and modify task schedules 7->60 68 6 other signatures 7->68 13 powershell.exe 23 7->13         started        16 cmd.exe 1 7->16         started        18 cmd.exe 1 7->18         started        26 3 other processes 7->26 62 Multi AV Scanner detection for dropped file 11->62 64 Injects code into the Windows Explorer (explorer.exe) 11->64 66 Modifies the context of a thread in another process (thread injection) 11->66 20 powershell.exe 11->20         started        22 cmd.exe 1 11->22         started        24 explorer.exe 1 11->24         started        signatures5 process6 signatures7 70 Loading BitLocker PowerShell Module 13->70 28 conhost.exe 13->28         started        30 conhost.exe 16->30         started        32 choice.exe 1 16->32         started        40 2 other processes 18->40 34 conhost.exe 20->34         started        42 2 other processes 22->42 36 conhost.exe 24->36         started        38 conhost.exe 26->38         started        44 3 other processes 26->44 process8
Gathering data
Threat name:
Win64.Packed.VMProtect
Status:
Suspicious
First seen:
2026-02-19 16:42:51 UTC
File Type:
PE+ (Exe)
AV detection:
17 of 24 (70.83%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution persistence upx
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
UPX packed file
Executes dropped EXE
Command and Scripting Interpreter: PowerShell
Unpacked files
SH256 hash:
7f37e85103beaf87529dce079b920489289c0c11052bf8de3ef0e846d8852945
MD5 hash:
fdecf2c297084d9ee0af977349993ec5
SHA1 hash:
ea4c54cb54703f2dbefabfb79c71f401635da05c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments