MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8aaf5d6cf3cb218df8ea2d6921279f14210bb97f1e2b17e8bb43746cd2f8219e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 14
| SHA256 hash: | 8aaf5d6cf3cb218df8ea2d6921279f14210bb97f1e2b17e8bb43746cd2f8219e |
|---|---|
| SHA3-384 hash: | e193aa4ead153c78057937531153430ef8997a8103391caa9ec19eb3a849040a4a3523e8da427ca6dc39ad8ea8c4a762 |
| SHA1 hash: | 4378b166bbe5a13b39c5bff9f55b5918a8185f95 |
| MD5 hash: | 648287d71d40226b952c5dc5d84e9341 |
| humanhash: | magnesium-tennessee-chicken-lake |
| File name: | file |
| Download: | download sample |
| File size: | 2'012'672 bytes |
| First seen: | 2025-10-20 04:01:50 UTC |
| Last seen: | 2025-10-27 14:04:05 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer) |
| ssdeep | 49152:wha6kF+QTqfrfGY12DUFCP1hirKLscA5kpXLz+W:2aPQ82iY12DUQiROJ |
| TLSH | T17895330356A9E1E9E7C1A3B7083641844B70B99D0B7FFAD6C15A031A737EBDC6798093 |
| TrID | 27.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 20.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 18.6% (.EXE) Win32 Executable (generic) (4504/4/1) 8.5% (.ICL) Windows Icons Library (generic) (2059/9) 8.3% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| Reporter | |
| Tags: | dropped-by-amadey exe |
Intelligence
File Origin
# of uploads :
20
# of downloads :
68
Origin country :
USVendor Threat Intelligence
Malware family:
orcus
ID:
1
File name:
virusvippro.exe.zip
Verdict:
Malicious activity
Analysis date:
2025-10-20 00:38:44 UTC
Tags:
arch-exec auto metasploit framework python clickfix github rat orcus stealc stealer anti-evasion xenorat miner phishing evasion generic possible-phishing payload quasar tinynuke agenttesla njrat rhadamanthys donutloader loader amadey cobaltstrike backdoor mimikatz tool networm amus xworm katzstealer auto-sch-xml remcos coinminer botnet lumma bladabindi stormkitty neshta worm putty rmm-tool ghostsocks proxyware vipkeylogger keylogger gh0st aurotun masslogger arechclient2 salatstealer nanocore snake redline fuery rustystealer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Verdict:
Malicious
Score:
81.4%
Tags:
malware
Result
Verdict:
Clean
Maliciousness:
Behaviour
Сreating synchronization primitives
Searching for analyzing tools
Creating a window
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
amadey crypt microsoft_visual_cc obfuscated overlay packed packed themidawinlicense unsafe zero
Verdict:
Malicious
Labled as:
Jaik.Generic
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-10-19T08:41:00Z UTC
Last seen:
2025-10-20T08:48:00Z UTC
Hits:
~10
Detections:
Trojan.Win32.Strab.sb HEUR:Trojan.Win32.Generic HEUR:Trojan.Win32.Fsysna.gen
Verdict:
Suspicious
Score:
100%
Verdict:
Malware
File Type:
PE
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Verdict:
Malicious
Threat:
Trojan.Win32.Strab
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-10-19 15:19:51 UTC
File Type:
PE (Exe)
AV detection:
21 of 24 (87.50%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
9/10
Tags:
defense_evasion discovery
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Program crash
System Location Discovery: System Language Discovery
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks BIOS information in registry
Identifies Wine through registry keys
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Verdict:
Unknown
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
8aaf5d6cf3cb218df8ea2d6921279f14210bb97f1e2b17e8bb43746cd2f8219e
MD5 hash:
648287d71d40226b952c5dc5d84e9341
SHA1 hash:
4378b166bbe5a13b39c5bff9f55b5918a8185f95
SH256 hash:
71fb336ce47cc4197d71ec66afbc9824d96bc89d0d7b4902c30c8bc1562e635e
MD5 hash:
96b7081db082d4c267314a4dafb691bd
SHA1 hash:
cd4aee9a616061cfb26e7aee7f1d1e418907e6f8
Malware family:
Rhadamanthys
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
exe 8aaf5d6cf3cb218df8ea2d6921279f14210bb97f1e2b17e8bb43746cd2f8219e
(this sample)
Dropped by
Amadey
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.