MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a46f5ec090c703c1b05f4fb3929934bd2017a84bf5b8caeebe5367e5617d1b59. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 2


Intelligence 2 IOCs YARA 7 File information Comments

SHA256 hash: a46f5ec090c703c1b05f4fb3929934bd2017a84bf5b8caeebe5367e5617d1b59
SHA3-384 hash: 7b91adc969f78966158d98d9738f36289e2f3a620b550b41424964dbf873caa0ce10dafb79dee5a55a82399d48edbb42
SHA1 hash: 905a8cc31bf544ed8b82b5463c298f1f7285c07d
MD5 hash: 4a234b987633463245e2dc78fa7dece3
humanhash: saturn-monkey-rugby-delaware
File name:System.Spy.Lib.dll
Download: download sample
File size:42'496 bytes
First seen:2025-10-30 14:47:22 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash dae02f32a21e03ce65412f6e56942daa (123 x YellowCockatoo, 60 x CobaltStrike, 44 x JanelaRAT)
ssdeep 768:/zg/Jltr8ZCMM21Tgszbu+TyIMc/MlaKG:/o4ZBdhzbu+T3Mc0LG
TLSH T1D5131888B74D8797CB5F0FBEC8E386128630F7DAA512E94B6FCC46E554B4BD110112E6
TrID 35.4% (.EXE) Win64 Executable (generic) (10522/11/4)
22.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.1% (.EXE) Win32 Executable (generic) (4504/4/1)
6.9% (.ICL) Windows Icons Library (generic) (2059/9)
6.8% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter luke92881
Tags:dll SystemShock

Intelligence


File Origin
# of uploads :
1
# of downloads :
151
Origin country :
US US
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
base64 masquerade obfuscated obfuscated packed packed reconnaissance smartassembly smart_assembly
Verdict:
inconclusive
YARA:
11 match(es)
Tags:
.Net Executable Managed .NET PE (Portable Executable) PE File Layout SOS: 0.35 Win 32 Exe x86
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Unpacked files
SH256 hash:
a46f5ec090c703c1b05f4fb3929934bd2017a84bf5b8caeebe5367e5617d1b59
MD5 hash:
4a234b987633463245e2dc78fa7dece3
SHA1 hash:
905a8cc31bf544ed8b82b5463c298f1f7285c07d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:extracted_at_0x44b
Author:cb
Description:sample - file extracted_at_0x44b.exe
Reference:Internal Research
Rule name:INDICATOR_EXE_Packed_SmartAssembly
Author:ditekSHen
Description:Detects executables packed with SmartAssembly
Rule name:INDICATOR_SUSPICIOUS_References_SecTools_B64Encoded
Author:ditekSHen
Description:Detects executables referencing many base64-encoded IR and analysis tools names
Rule name:NET
Author:malware-lu
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments