MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a351e0211912bd7edeb74053a2b27ef04e3189a80780171d8a426818cecf0b0b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Expiro
Vendor detections: 17
| SHA256 hash: | a351e0211912bd7edeb74053a2b27ef04e3189a80780171d8a426818cecf0b0b |
|---|---|
| SHA3-384 hash: | a5761f1ac7f5628cd35725c8ce18ed1e6f602b7f895eed765e3a407846a5da3d773b4385332386c4ae82548e8ac3bc98 |
| SHA1 hash: | bc4bb3e45b02a01406db650059c28e1cbc13acf6 |
| MD5 hash: | b66e1459c22283ec971e550285993bf6 |
| humanhash: | xray-two-stairway-river |
| File name: | rDHLSHIPMENTSNOTIFICATIONDocument.exe |
| Download: | download sample |
| Signature | Expiro |
| File size: | 1'877'504 bytes |
| First seen: | 2025-06-26 02:30:07 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 0b768923437678ce375719e30b21693e (143 x Formbook, 25 x MassLogger, 22 x SnakeKeylogger) |
| ssdeep | 49152:MPVtHLZeJbInQRaKN8mQSpTLNiXicJFFRGNzj3:yLYbInQxQSpT7wRGpj3 |
| Threatray | 155 similar samples on MalwareBazaar |
| TLSH | T1BB95E00273C1D062FFAB91334F5AE6115ABC79264123AA2F13981D79FA705B1473E7A3 |
| TrID | 40.3% (.EXE) Win64 Executable (generic) (10522/11/4) 19.3% (.EXE) Win16 NE executable (generic) (5038/12/1) 17.2% (.EXE) Win32 Executable (generic) (4504/4/1) 7.7% (.EXE) OS/2 Executable (generic) (2029/13) 7.6% (.EXE) Generic Win/DOS Executable (2002/3) |
| Magika | pebin |
| dhash icon | aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla) |
| Reporter | |
| Tags: | exe Expiro |
Intelligence
File Origin
BRVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Unpacked files
7c0f7f7b7442b12b297cb0b9c93c3d4083e1752c7ffb965830ab4266ee194ee6
9f245a4fad1a5fc0476cbac1401a05fd83cdd429ddcef8a3ba6bb70522db7967
0ea246c52245f5dd919aead5707821080a13b70af25218973a14f373a4691ec3
a351e0211912bd7edeb74053a2b27ef04e3189a80780171d8a426818cecf0b0b
ec2f7f564f0d51b2962884a883279651c8afcfc5353ca1501e1da1eb46ecdbaf
0242cc5f86d2d874358e069fe1ec98aaabc7bc8672106b6adeedebd08b25ca63
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious. |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerCheck__GlobalFlags |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerCheck__QueryInfo |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerHiding__Active |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerHiding__Thread |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | dgaagas |
|---|---|
| Author: | Harshit |
| Description: | Uses certutil.exe to download a file named test.txt |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | malware_shellcode_hash |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect shellcode api hash value |
| Rule name: | MD5_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for MD5 constants |
| Rule name: | pe_detect_tls_callbacks |
|---|
| Rule name: | pe_no_import_table |
|---|---|
| Description: | Detect pe file that no import table |
| Rule name: | RIPEMD160_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for RIPEMD-160 constants |
| Rule name: | SEH__vectored |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | SHA1_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for SHA1 constants |
| Rule name: | SHA512_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for SHA384/SHA512 constants |
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | Windows_Trojan_M0yv_92f66467 |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_m0yv_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.m0yv. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.