MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8dfa125b86de55900e8d8423bc8af52cc50abd7095203731972bdea19de63ed5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 13


Intelligence 13 IOCs YARA 9 File information Comments

SHA256 hash: 8dfa125b86de55900e8d8423bc8af52cc50abd7095203731972bdea19de63ed5
SHA3-384 hash: 89cdb56e40e9975fba33a89ea422a0f0bfa9694f489cd7e33d2211238f66196603b73800d77026474e5046ae1487c9f0
SHA1 hash: 77b26f859370a5914e883939b82e04e168d330b1
MD5 hash: 84160465eba93db5fbf349565941fad3
humanhash: oklahoma-snake-pluto-georgia
File name:84160465eba93db5fbf349565941fad3.exe
Download: download sample
File size:3'218'432 bytes
First seen:2026-02-27 16:40:36 UTC
Last seen:2026-02-27 17:42:16 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f1b9f4ddfaf3ec6ab992b59da8c25802
ssdeep 98304:kqXfVfpZxjvIqjkgTVhQSDis8V/y1mDT:kWfhTiqjdrOV/y
TLSH T1E6E533600CBD72E4D456043A49AA82031D57BD7FE3B9C369669CEE5B273B380CCA536D
TrID 55.2% (.EXE) UPX compressed Win64 Executable (70117/5/12)
21.3% (.EXE) UPX compressed Win32 Executable (27066/9/6)
13.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.9% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.6% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter abuse_ch
Tags:exe UPX
File size (compressed) :3'218'432 bytes
File size (de-compressed) :4'192'768 bytes
Format:win64/pe
Unpacked file: f2379598561aadb7c49aad9a08b566f23f096120a5d61e0e13357bb6999e356c

Intelligence


File Origin
# of uploads :
2
# of downloads :
89
Origin country :
SE SE
Vendor Threat Intelligence
Malware configuration found for:
PEPacker
Details
PEPacker
a UPX version number and an unpacked binary
Malware family:
n/a
ID:
1
File name:
_8dfa125b86de55900e8d8423bc8af52cc50abd7095203731972bdea19de63ed5.exe
Verdict:
Malicious activity
Analysis date:
2026-02-27 16:42:30 UTC
Tags:
uac evasion auto-reg upx stealer arch-doc

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
emotet shell sage remo
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm crypto crypto hacktool mingw packed packed packed packed rozena upx
Verdict:
Malicious
File Type:
exe x64
Detections:
Trojan.Win64.Agent.gen Trojan.Win32.PowerShell.nhy PDM:Trojan.Win32.Generic
Malware family:
Cactus Ransomware
Verdict:
Malicious
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Drops password protected ZIP file
Found direct / indirect Syscall (likely to bypass EDR)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sets debug register (to hijack the execution of another thread)
Sigma detected: Bypass UAC via Fodhelper.exe
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
UAC bypass detected (Fodhelper)
Uses WMIC command to query system information (often done to detect virtual machines)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1876076 Sample: 4LaqiRGgaw.exe Startdate: 27/02/2026 Architecture: WINDOWS Score: 100 79 www.google.com 2->79 81 ip-api.com 2->81 83 api.ipify.org 2->83 93 Multi AV Scanner detection for dropped file 2->93 95 Multi AV Scanner detection for submitted file 2->95 97 Drops password protected ZIP file 2->97 99 4 other signatures 2->99 11 SecurityHealthService.exe 2 2->11         started        14 4LaqiRGgaw.exe 1 7 2->14         started        18 SecurityHealthService.exe 2->18         started        20 svchost.exe 1 1 2->20         started        signatures3 process4 dnsIp5 119 Multi AV Scanner detection for dropped file 11->119 121 UAC bypass detected (Fodhelper) 11->121 123 Suspicious powershell command line found 11->123 125 Uses WMIC command to query system information (often done to detect virtual machines) 11->125 22 cmd.exe 2 11->22         started        85 ip-api.com 208.95.112.1, 49697, 49708, 49711 TUT-ASUS United States 14->85 87 www.google.com 142.251.210.68, 443, 49692, 49706 GOOGLEUS United States 14->87 89 api.ipify.org 172.67.74.152, 443, 49695, 49707 CLOUDFLARENETUS United States 14->89 75 C:\Users\user\...\SecurityHealthService.exe, PE32+ 14->75 dropped 127 Found many strings related to Crypto-Wallets (likely being stolen) 14->127 129 Sets debug register (to hijack the execution of another thread) 14->129 131 Adds a directory exclusion to Windows Defender 14->131 133 2 other signatures 14->133 24 powershell.exe 23 14->24         started        27 WMIC.exe 14->27         started        29 cmd.exe 18->29         started        91 127.0.0.1 unknown unknown 20->91 file6 signatures7 process8 signatures9 31 fodhelper.exe 12 22->31         started        33 conhost.exe 22->33         started        35 fodhelper.exe 22->35         started        37 fodhelper.exe 22->37         started        115 Loading BitLocker PowerShell Module 24->115 39 conhost.exe 24->39         started        41 conhost.exe 27->41         started        43 fodhelper.exe 29->43         started        45 conhost.exe 29->45         started        47 2 other processes 29->47 process10 process11 49 SecurityHealthService.exe 2 20 31->49         started        54 SecurityHealthService.exe 43->54         started        dnsIp12 77 155.212.242.133, 49713, 80 WINDSTREAMUS United States 49->77 73 C:\Users\user\...\~DF15A081ED.tmp (copy), PE32+ 49->73 dropped 101 Suspicious powershell command line found 49->101 103 Tries to harvest and steal browser information (history, passwords, etc) 49->103 105 Adds a directory exclusion to Windows Defender 49->105 107 Tries to steal Crypto Currency Wallets 49->107 56 powershell.exe 49->56         started        59 WMIC.exe 49->59         started        109 Hides that the sample has been downloaded from the Internet (zone.identifier) 54->109 111 Uses WMIC command to query system information (often done to detect virtual machines) 54->111 113 Found direct / indirect Syscall (likely to bypass EDR) 54->113 61 powershell.exe 54->61         started        63 WMIC.exe 54->63         started        file13 signatures14 process15 signatures16 117 Loading BitLocker PowerShell Module 56->117 65 conhost.exe 56->65         started        67 conhost.exe 59->67         started        69 conhost.exe 61->69         started        71 conhost.exe 63->71         started        process17
Gathering data
Result
Malware family:
n/a
Score:
  8/10
Tags:
collection discovery execution persistence spyware stealer upx
Behaviour
Checks processor information in registry
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
Enumerates physical storage devices
UPX packed file
Accesses 2FA software files, possible credential harvesting
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Enumerates connected drives
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Reads user/profile data of web browsers
Command and Scripting Interpreter: PowerShell
Unpacked files
SH256 hash:
8dfa125b86de55900e8d8423bc8af52cc50abd7095203731972bdea19de63ed5
MD5 hash:
84160465eba93db5fbf349565941fad3
SHA1 hash:
77b26f859370a5914e883939b82e04e168d330b1
SH256 hash:
f2379598561aadb7c49aad9a08b566f23f096120a5d61e0e13357bb6999e356c
MD5 hash:
0662d559d283c16bff6177db4938746a
SHA1 hash:
f986b24476399110fc96696ebba533269873c833
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:grakate_stealer_nov_2021
Rule name:pe_detect_tls_callbacks
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:telebot_framework
Author:vietdx.mb
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:upx_largefile
Author:k3nr9

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Executable exe 8dfa125b86de55900e8d8423bc8af52cc50abd7095203731972bdea19de63ed5

(this sample)

Comments