MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a32e2d400bb7feb63d29738d6a31959228530974fe928b9c48787fadaf17d8a0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Kimsuky


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: a32e2d400bb7feb63d29738d6a31959228530974fe928b9c48787fadaf17d8a0
SHA3-384 hash: 56bedbd732fad21d8924b31971d3b35e9f392d130217a9e00933c57def55844e958693a535378aac4e2145fcaad9e8bf
SHA1 hash: 72638ffd88f29055f279c440b51f7d68419f68f7
MD5 hash: 4b44eacbfe8299deb2c952ae5776c8c6
humanhash: berlin-queen-louisiana-carpet
File name:Condor_API-1.chm
Download: download sample
Signature Kimsuky
File size:16'311 bytes
First seen:2026-04-15 07:34:19 UTC
Last seen:Never
File type:
MIME type:application/vnd.ms-htmlhelp
ssdeep 192:tclOVaIe0a5zdYjNdZO0EHOeTUbMq/Wl3RCnTZentkpuA5Nr:tclOVEJ/kXCXWGkVH
TLSH T1D6729E450328851ED11B853AAC8231C962367F913CD952BAD4C2F73E6AB9ECD2CA2D59
TrID 81.0% (.CHI) Windows HELP Index (17144/6)
18.9% (.CHM) Windows HELP File (4000/1)
Magika chm
Reporter smica83
Tags:apt chm DPRK Kimsuky

Intelligence


File Origin
# of uploads :
1
# of downloads :
74
Origin country :
HU HU
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
96.5%
Tags:
obfuscate xtreme sage
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
kimsuky
Verdict:
Malicious
File Type:
chm
First seen:
2026-04-15T03:25:00Z UTC
Last seen:
2026-04-15T13:06:00Z UTC
Hits:
~100
Detections:
Trojan.Multi.Agent.sb Trojan-PSW.Win32.Stealer.sb HEUR:Trojan-Downloader.Script.Generic PDM:Trojan.Win32.Generic PDM:Exploit.Win32.Generic Trojan.Win32.Agent.sb Trojan-Downloader.JS.SLoad.sb Trojan.JS.SAgent.sb HEUR:Trojan.Script.Generic NetTool.PowerShellUA.HTTP.C&C NetTool.PowerShellGet.HTTP.C&C
Threat name:
Script-JS.Dropper.Heuristic
Status:
Malicious
First seen:
2026-04-15 05:21:05 UTC
File Type:
Binary (Archive)
Extracted files:
15
AV detection:
5 of 36 (13.89%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
defense_evasion execution persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Deobfuscate/Decode Files or Information
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CHM_File_Executes_JS_Via_PowerShell
Author:daniyyell
Description:Detects a Microsoft Compiled HTML Help (CHM) file that executes embedded JavaScript to launch a messagebox via PowerShell

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments