MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a22937f74febea9ab8961ff74ee2a2157c9d82db892e82d9e912e28da984eab6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
ConnectWise
Vendor detections: 14
| SHA256 hash: | a22937f74febea9ab8961ff74ee2a2157c9d82db892e82d9e912e28da984eab6 |
|---|---|
| SHA3-384 hash: | 28244371480f0d11768b0432dfcfdfa9a876bd731b6269b3c972306606b52983aff14ce2ccb837be56c7d2c2fba585f6 |
| SHA1 hash: | bc286b4291c599e20b14d4160e967d2a900275a2 |
| MD5 hash: | de70c76d93a37ce64266fa3b5fd59a4a |
| humanhash: | november-texas-fillet-uncle |
| File name: | ScreenConnect.ClientSetup.exe |
| Download: | download sample |
| Signature | ConnectWise |
| File size: | 5'648'984 bytes |
| First seen: | 2026-05-02 16:50:30 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 9771ee6344923fa220489ab01239bdfd (385 x ConnectWise) |
| ssdeep | 49152:zfRBDtJkGYYpT0+TFiH7efP3nrGLq7FVsLBe+1GVxrKlsuwGenGwfZVkVjOi8if0:Hqs6efP3rn/TYGVxz3GBwRVkGuyXOM |
| Threatray | 2'145 similar samples on MalwareBazaar |
| TLSH | T1F146F141B3D695B5D0BF0638D87A42A65634BC108712CBFF57A4BD296D32BC08E7237A |
| TrID | 29.5% (.EXE) Win64 Executable (generic) (6522/11/2) 22.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 20.3% (.EXE) Win32 Executable (generic) (4504/4/1) 9.1% (.EXE) OS/2 Executable (generic) (2029/13) 9.0% (.EXE) Generic Win/DOS Executable (2002/3) |
| Magika | pebin |
| Reporter | |
| Tags: | ConnectWise signed |
Code Signing Certificate
| Organisation: | Babaian tech LLC. |
|---|---|
| Issuer: | Verokey High Assurance Secure Code EV |
| Algorithm: | sha256WithRSAEncryption |
| Valid from: | 2025-08-19T00:00:00Z |
| Valid to: | 2026-08-18T23:59:59Z |
| Serial number: | 0126669732acec9b2fd03ae3c0c4f6d0 |
| Intelligence: | 6 malware samples on MalwareBazaar are signed with this code signing certificate |
| Cert Graveyard Blocklist: | This certificate is on the Cert Graveyard blocklist |
| Thumbprint Algorithm: | SHA256 |
| Thumbprint: | 26bfc981256561732b25d7409770e90936b51738443c87afa4cb7f9cdac6d4a8 |
| Source: | This information was brought to you by ReversingLabs A1000 Malware Analysis Platform |
Intelligence
File Origin
AEVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CP_Script_Inject_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | Detects attempts to inject code into another process across PE, ELF, Mach-O binaries |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | INDICATOR_EXE_DotNET_Encrypted |
|---|---|
| Author: | ditekSHen |
| Description: | Detects encrypted or obfuscated .NET executables |
| Rule name: | INDICATOR_RMM_ConnectWise_ScreenConnect |
|---|---|
| Author: | ditekSHen |
| Description: | Detects ConnectWise Control (formerly ScreenConnect). Review RMM Inventory |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | telebot_framework |
|---|---|
| Author: | vietdx.mb |
| Rule name: | TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE |
|---|---|
| Author: | CYFARE |
| Description: | Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments |
| Reference: | https://cyfare.net/ |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.