MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9f420824ec0cad72ccf7fe465df69037a8a0c73798ed01da4392f4fdae57ec26. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DonutLoader


Vendor detections: 9


Intelligence 9 IOCs YARA 13 File information Comments

SHA256 hash: 9f420824ec0cad72ccf7fe465df69037a8a0c73798ed01da4392f4fdae57ec26
SHA3-384 hash: b4f309342c4a9952b34347746647c8e88b637a2d839f012c4db95ac1db971bac2fae0157ab6029c894c75284d61dd0b4
SHA1 hash: 339bdfd0d17d7b8e227b067fda33ce1364ff34e4
MD5 hash: a4241c341d0bbdf9617f4f17b7132565
humanhash: solar-mobile-green-venus
File name:file
Download: download sample
Signature DonutLoader
File size:209'550 bytes
First seen:2026-02-12 14:00:59 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 3072:84/y4JoK8g3eFSRqvZ9qCYxxKloRbNQdpmPYk0uZlDj6UFHS+HcIKeYiJ1YhHZoN:82Jgg37qx9qCYfoCYkNbj6U4kKeh1gqB
TLSH T13C2413C85CFD4720F152DE048895ABA640A645620D2F6BF41B6B394B0CABDFF973B19C
Magika zip
Reporter Bitsight
Tags:138f52 donutloader dropped-by-amadey zip


Avatar
Bitsight
url: http://85.137.252.28/vivo.zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
147
Origin country :
US US
File Archive Information

This file archive contains 2 file(s), sorted by their relevance:

File name:iopertui.exe
File size:285'184 bytes
SHA256 hash: 3477260209c72d9fcf1bffd50268b1abe96493a61543dc4d4e266a85b5151818
MD5 hash: 8ad19acbc6fed05122935c9c6812c4ec
MIME type:application/x-dosexec
Signature DonutLoader
File name:vivo.exe
File size:135'168 bytes
SHA256 hash: e36df1a98574c37e463f13aee1ade962afcadc11ed4756c9c4412e7a71f67fc3
MD5 hash: a3c9eb98125f8c161ce2ba8a5648ab14
MIME type:application/x-dosexec
Signature DonutLoader
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.9%
Tags:
stration dropper virus
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm cmd explorer fingerprint fingerprint lolbin microsoft_visual_cc msiexec reconnaissance rundll32
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Zip Archive
Result
Malware family:
donutloader
Score:
  10/10
Tags:
family:donutloader discovery execution loader spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Checks computer location settings
Executes dropped EXE
Reads user/profile data of web browsers
Command and Scripting Interpreter: PowerShell
Downloads MZ/PE file
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DonutLoader

zip 9f420824ec0cad72ccf7fe465df69037a8a0c73798ed01da4392f4fdae57ec26

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

Comments