MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 96d2eaff43d5807ee8c55e6ac9a8d32855198dc3bf83327766e53e4e7a88ff53. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: 96d2eaff43d5807ee8c55e6ac9a8d32855198dc3bf83327766e53e4e7a88ff53
SHA3-384 hash: 5e59a45b335caf000aa27a12706a0f6c3c3cd076a28ac7c9f08d6748583fa308b84a2c224b100acc5534454c161eb934
SHA1 hash: 846b600d779edc8cafdb91ebca5b01f6faa4b97c
MD5 hash: feef71c9299c0b6f7313074260fae590
humanhash: echo-march-lithium-pasta
File name:Prizm.exe
Download: download sample
File size:8'704 bytes
First seen:2026-05-14 23:19:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 105732f0c6968ac8bea2b4476eda4263
ssdeep 96:nPAdoVXslAZmdwRMFNBJulbLQDzMa9wrfj3mG+xQHMWXguj8WKNy+laD:n4oYamduGNBqg39wrShxQH9gq8WlMa
TLSH T1B9026CBD01206713F3EB917B72E2BAEB7234C9255F6F470C4B083A5264E604494B2F62
TrID 34.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
23.4% (.EXE) Win32 Executable (generic) (4504/4/1)
10.8% (.EXE) Win16/32 Executable Delphi generic (2072/23)
10.5% (.EXE) OS/2 Executable (generic) (2029/13)
10.4% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter BKHlovesgt7
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
116
Origin country :
US US
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
https://dro.pm/2
Verdict:
Malicious activity
Analysis date:
2024-11-02 14:36:43 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
malware
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed virus
Verdict:
Malicious
File Type:
exe x32
First seen:
2012-06-19T19:33:00Z UTC
Last seen:
2026-05-16T00:38:00Z UTC
Hits:
~100
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Virus.Prizm
Status:
Malicious
First seen:
2011-05-28 08:39:00 UTC
File Type:
PE (Exe)
AV detection:
28 of 36 (77.78%)
Threat level:
  5/5
Gathering data
Unpacked files
SH256 hash:
96d2eaff43d5807ee8c55e6ac9a8d32855198dc3bf83327766e53e4e7a88ff53
MD5 hash:
feef71c9299c0b6f7313074260fae590
SHA1 hash:
846b600d779edc8cafdb91ebca5b01f6faa4b97c
SH256 hash:
cfde758a56784173521adfb5a28b62a09c6d049fc5c43c1da1777b0fbe893ec5
MD5 hash:
f27c0e6d1e3c860c8402601f8eb695c2
SHA1 hash:
f3dbf084d749ec407a370423b2bdde3614e76201
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments