MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8b70eb599bcf04bfc858b79f6e3977a7829fa3cce80367a7eec1597c8e34aad4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Ousaban


Vendor detections: 10


Intelligence 10 IOCs YARA 8 File information Comments 1

SHA256 hash: 8b70eb599bcf04bfc858b79f6e3977a7829fa3cce80367a7eec1597c8e34aad4
SHA3-384 hash: 0edc639c91ceae5c1bbe97a70662e8d675333e0cbd1e83dd7a44330522c94c5f3774f6379f63e7d01e8c4dc95a3060dc
SHA1 hash: 3ad04b3ffb5e145983b1617e40247b1bd5c97278
MD5 hash: b26707c129e221c22aafbd951048283f
humanhash: oranges-enemy-happy-solar
File name:avutil.dll
Download: download sample
Signature Ousaban
File size:1'034'804 bytes
First seen:2026-04-13 00:48:32 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 210b4db7b6c066ddf11bc4b7a4fc6f80 (1 x Ousaban)
ssdeep 12288:JtJB/OkUDWvOEgq2Zc0+z5sJi4TlqJOiZc/R:tB/wqrIZc0+yJXlqqJ
TLSH T1B3256C22B200A63DD59D093DD27E6B715D7EA7A224D1DC48AFF44A4DEF79181223E20F
TrID 63.7% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
10.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.0% (.EXE) Win64 Executable (generic) (6522/11/2)
6.9% (.EXE) Win32 Executable (generic) (4504/4/1)
3.1% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter johnk3r
Tags:adobeready-online banker dll ousaban

Intelligence


File Origin
# of uploads :
1
# of downloads :
157
Origin country :
CH CH
Vendor Threat Intelligence
No detections
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-debug base64 embarcadero_delphi fingerprint overlay packed zusy
Verdict:
Malicious
File Type:
dll x32
First seen:
2026-04-12T21:57:00Z UTC
Last seen:
2026-04-14T15:10:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan.Win32.Injector.gen
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1897096 Sample: avutil.dll Startdate: 13/04/2026 Architecture: WINDOWS Score: 48 28 shed.dual-low.part-0012.t-0009.t-msedge.net 2->28 30 shed.dual-low.part-0010.t-0009.t-msedge.net 2->30 32 4 other IPs or domains 2->32 36 Multi AV Scanner detection for submitted file 2->36 9 loaddll32.exe 1 2->9         started        signatures3 process4 process5 11 cmd.exe 1 9->11         started        13 rundll32.exe 9->13         started        15 rundll32.exe 9->15         started        17 21 other processes 9->17 process6 19 rundll32.exe 11->19         started        21 WerFault.exe 16 13->21         started        23 WerFault.exe 16 15->23         started        process7 25 WerFault.exe 22 18 19->25         started        dnsIp8 34 part-0010.t-0009.t-msedge.net 13.107.246.38, 443, 49741, 49742 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 25->34
Gathering data
Threat name:
Win32.Infostealer.Tinba
Status:
Malicious
First seen:
2026-04-13 00:49:33 UTC
File Type:
PE (Dll)
Extracted files:
2
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
Unpacked files
SH256 hash:
8b70eb599bcf04bfc858b79f6e3977a7829fa3cce80367a7eec1597c8e34aad4
MD5 hash:
b26707c129e221c22aafbd951048283f
SHA1 hash:
3ad04b3ffb5e145983b1617e40247b1bd5c97278
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:Borland
Author:malware-lu
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Reference:https://cyfare.net/
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
Padawan commented on 2026-04-13 00:59:44 UTC

Key: BAUdGYGlgX3wUY4XrGGt*
Targets:
Banco Inter
Banco MUFG Brasil S.A.
Banco Safra
SafraNet
Banco Rendimento
Banese
BANCO PAULISTA
Banco Senff
modalmais
Banco BV
Banpar
NBC BANK
Tribanco
Banco Alfa
Banco Indusval
Celcoin
BRB Banknet
Banco de Bras
Banco Topazio
Banco Industrial
Banco BS2
Banco Semear
Banco ABC
Banco Bradesco Google
Bradesco Exclusive
Bradesco Prime
GR Caixa
Banestes J

Fatura | Hipercard
Cartao Atacadao
Cartao Renner
Cartao Carrefour

Superdigital
Conta Simples
Pague Veloz
Stone
Asaas
Gerencianet
Cora Banco

Viacredi
Evolua
Sistema Ailos
Credifoz
CrediCoopeval
Sulcred
CrediSIS
Sicoob

BitCoinTrade
Foxbit
Mercado Bitcoin
BitPre
Brasil Bitcoin
Blockchain
Bitfinex
PrimeBit
Binance
Poloniex
MetaMask

Mercado Livre
Perguntas - Mercado Livre
Mercado Env
Mercado Pago