MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8af226c0aa71fefe5228e881f4b5c5d90a8b41c290b96f44f56990d8dc3fac1c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GlassWorm


Vendor detections: 5


Intelligence 5 IOCs YARA 2 File information Comments

SHA256 hash: 8af226c0aa71fefe5228e881f4b5c5d90a8b41c290b96f44f56990d8dc3fac1c
SHA3-384 hash: 867f8f0cb5805a149a2bce8e73bdf192e4d110a612da42605fb757f32f0ae862b53f83e73a6eabe7913ae8e45ee2105a
SHA1 hash: 8a3a2d73ae86b9dde16a521ae55b3d4d1cc600d7
MD5 hash: 6b7c093f5e213d871579de023e567b31
humanhash: finch-foxtrot-ack-may
File name:node-v22.9.0-win-x64.zip
Download: download sample
Signature GlassWorm
File size:33'175'325 bytes
First seen:2026-04-15 23:16:45 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 786432:dCs/wUkt2lz2El5sJ6Xc368u2IIlbc4v79X4R:dLIviYJJGURIR
TLSH T1ED77239451B91677CEAF7AFBF1C1A2A25DCDDAC69E207D2A082C27CE4C630B04BC551D
TrID 66.6% (.XPI) Mozilla Firefox browser extension (8000/1/1)
33.3% (.ZIP) ZIP compressed archive (4000/1)
Magika zip
Reporter tipo_deincognito
Tags:cryptocurrency glassworm infostealer Wave3 zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
448
Origin country :
ES ES
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Malicious Scriptlet 2 of 7
Detected a malicious pivot typically seen during the 'file-less' pivot commonly seen in malware carriers.
Verdict:
Clean
File Type:
zip
First seen:
2024-09-18T07:53:00Z UTC
Last seen:
2024-10-09T13:18:00Z UTC
Hits:
~10
Gathering data
Result
Malware family:
n/a
Score:
  3/10
Tags:
execution linux
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:telebot_framework
Author:vietdx.mb
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments