MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 95c18ee24d6e3808b366a5e8aad664b83c49211e8b2291286577b68fb6a74655. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA 17 File information Comments

SHA256 hash: 95c18ee24d6e3808b366a5e8aad664b83c49211e8b2291286577b68fb6a74655
SHA3-384 hash: e37b8485913470995f8096947570d27dd039ccbb2f6b586341c336e5423356ebdd7359a837563f2b8a922feb9d310884
SHA1 hash: 55e00117ee2ba2d8ad01a1124c19edcf2c50763d
MD5 hash: b79734bdd0192faf7ab0a5d764acfac8
humanhash: comet-east-harry-cold
File name:susi.exe1
Download: download sample
File size:35'901'440 bytes
First seen:2025-03-18 12:57:08 UTC
Last seen:2025-03-19 12:57:35 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d50cc58fda75dc637e7a5a71ad482257
ssdeep 393216:FhcagbGGeJnQ6NqEae5CyV67hihoAYib4t6ra7B9ghtdc8z6JD9a9pYmP/nXwR99:dMUn8JlykQP4kdQ
TLSH T178779D1772E501D4E07AD0398B67C507EBB1B8161731ABCB25A4A6A92F77BF01D7E320
TrID 56.7% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
14.3% (.EXE) Win64 Executable (generic) (10522/11/4)
7.5% (.FON) Windows Font (5545/9/1)
6.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.1% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter KatzenTech
Tags:176-113-115-7 exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
447
Origin country :
RU RU
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
susi.exe1
Verdict:
No threats detected
Analysis date:
2025-03-18 13:35:17 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context anti-debug crypto fingerprint keylogger masquerade microsoft_visual_cc packed packed packer_detected python rat
Result
Verdict:
UNKNOWN
Result
Threat name:
n/a
Detection:
clean
Classification:
n/a
Score:
3 / 100
Behaviour
Behavior Graph:
n/a
Gathering data
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious behavior: AddClipboardFormatListener
Verdict:
Suspicious
Tags:
external_ip_lookup
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_Debugger
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Glasses
Author:Seth Hardy
Description:Glasses family
Rule name:GlassesCode
Author:Seth Hardy
Description:Glasses code features
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:pe_detect_tls_callbacks
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:skip20_sqllang_hook
Author:Mathieu Tartare <mathieu.tartare@eset.com>
Description:YARA rule to detect if a sqllang.dll version is targeted by skip-2.0. Each byte pattern corresponds to a function hooked by skip-2.0. If $1_0 or $1_1 match, it is probably targeted as it corresponds to the hook responsible for bypassing the authentication.
Reference:https://www.welivesecurity.com/
Rule name:telegram_bot_api
Author:rectifyq
Description:Detects file containing Telegram Bot API
Rule name:test_Malaysia
Author:rectifyq
Description:Detects file containing malaysia string
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 95c18ee24d6e3808b366a5e8aad664b83c49211e8b2291286577b68fb6a74655

(this sample)

  
Delivery method
Distributed via web download

Comments