MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8abc327c8a9947246722ed0c5a39fe5afa0bcf4064c1e7b071e96083018f398c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA 6 File information Comments

SHA256 hash: 8abc327c8a9947246722ed0c5a39fe5afa0bcf4064c1e7b071e96083018f398c
SHA3-384 hash: b0bfa2d2cd771c5150fbd624af854e5b914332fa0c12d8ac5d0b34960cb000e2f58b4cda3b7dad2306ec8de5e7598bdb
SHA1 hash: 3795957ec87f36b260821ba10503299c740af40f
MD5 hash: a4431cff2a0cf50fb113759b71179567
humanhash: arizona-india-mirror-equal
File name:GGWP.exe
Download: download sample
File size:1'490'136 bytes
First seen:2026-05-15 19:17:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash aaeeceb8083c5058b75d7a733f1628e1
ssdeep 24576:xvQex38cq34z/bMajnudt3n2wNo0GF3ICDksfu3mDqjiVg:Oex38cq34z/YQnudNNRG3DW3W2iW
TLSH T160657C17E2E345ECC56FC134C3639772BA70B42952287D6E1AA4D7322F21F509B6EB24
TrID 33.1% (.EXE) Win64 Executable (generic) (6522/11/2)
25.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.4% (.ICL) Windows Icons Library (generic) (2059/9)
10.3% (.EXE) OS/2 Executable (generic) (2029/13)
10.1% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
dhash icon cc96b2f0f0b296c8
Reporter burger
Tags:exe signed

Code Signing Certificate

Organisation:Chocolatey Software, Inc.
Issuer:Chocolatey Software, Inc.
Algorithm:sha1WithRSAEncryption
Valid from:2026-05-15T14:52:19Z
Valid to:2027-05-15T15:02:19Z
Serial number: 4ce67b979733009940b1ab8229f7499e
Thumbprint Algorithm:SHA256
Thumbprint: bfa77f40b3376f7ba2bec876284d0229ef2927c225066d0aa81be6bc5a8cc665
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
118
Origin country :
US US
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
GGWP.exe
Verdict:
Malicious activity
Analysis date:
2026-05-15 19:16:29 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
90.2%
Tags:
injection obfusc virus
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug crypto hacktool packed reconnaissance signed
Result
Gathering data
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
45 / 100
Signature
AI detected suspicious PE digital signature
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Behaviour
Behavior Graph:
Gathering data
Gathering data
Unpacked files
SH256 hash:
8abc327c8a9947246722ed0c5a39fe5afa0bcf4064c1e7b071e96083018f398c
MD5 hash:
a4431cff2a0cf50fb113759b71179567
SHA1 hash:
3795957ec87f36b260821ba10503299c740af40f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Reference:https://cyfare.net/
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments