MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aa85e090de33a23971de4a85cdfe2e2efa32f85ebbbf4ffd53e2945a9ffa8494. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DonutLoader


Vendor detections: 13


Intelligence 13 IOCs YARA 5 File information Comments

SHA256 hash: aa85e090de33a23971de4a85cdfe2e2efa32f85ebbbf4ffd53e2945a9ffa8494
SHA3-384 hash: 8304d8c849ca2457fd3e8f590df83357f418c1d4750e31e7efc28aba5860a1b0e1eb101011aba3a7fa674e607eee9359
SHA1 hash: c1b4bfadc0b9e4065e474e59ff3e55d619f160e7
MD5 hash: d792303512b4d6a764e389e8c198f236
humanhash: cold-georgia-table-artist
File name:VC_redist.x64.exe
Download: download sample
Signature DonutLoader
File size:989'059 bytes
First seen:2025-05-04 17:46:52 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 75e9596d74d063246ba6f3ac7c5369a0 (8 x DCRat, 5 x PythonStealer, 4 x CoinMiner)
ssdeep 24576:vBkVdlYA/p6xxCz7dUIAHfvOOs0ONzLnA:Zsvx6SzBURXOOs0MfA
TLSH T18A251212F9C1C0B2C57616329E699771A6BC7C208F218BDB43C4797EAF351D2E3316A6
TrID 40.3% (.EXE) Win64 Executable (generic) (10522/11/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4504/4/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
dhash icon b2e1b496a6cada72 (13 x LummaStealer, 12 x AsyncRAT, 8 x Rhadamanthys)
Reporter abuse_ch
Tags:donutloader exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
426
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
96.5%
Tags:
shellcode injection virus
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Bypasses PowerShell execution policy
Encrypted powershell cmdline option found
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suspicious powershell command line found
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1680967 Sample: VC_redist.x64.exe Startdate: 04/05/2025 Architecture: WINDOWS Score: 100 39 pki-goog.l.google.com 2->39 41 lofhr.com 2->41 43 3 other IPs or domains 2->43 49 Malicious sample detected (through community Yara rule) 2->49 51 Multi AV Scanner detection for submitted file 2->51 53 .NET source code contains potential unpacker 2->53 55 7 other signatures 2->55 8 Item.exe 3 2->8         started        11 VC_redist.x64.exe 13 2->11         started        14 powershell.exe 23 2->14         started        16 4 other processes 2->16 signatures3 process4 file5 61 Multi AV Scanner detection for dropped file 8->61 63 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 8->63 65 Writes to foreign memory regions 8->65 69 2 other signatures 8->69 18 InstallUtil.exe 14 2 8->18         started        37 C:\Users\user\AppData\Local\...\CE749333.exe, PE32+ 11->37 dropped 22 CE749333.exe 6 11->22         started        67 Loading BitLocker PowerShell Module 14->67 25 conhost.exe 14->25         started        27 conhost.exe 16->27         started        29 conhost.exe 16->29         started        31 conhost.exe 16->31         started        signatures6 process7 dnsIp8 45 loadingfreelofhr.net 185.208.156.66, 443, 49695 SIMPLECARRIERCH Switzerland 18->45 47 loadingfreedlophr.com.de 213.209.150.69, 49694, 49696, 49697 KEMINETAL Germany 18->47 33 chrome.exe 18->33         started        35 C:\Users\user\AppData\Local\...\Item.exe, PE32+ 22->35 dropped 57 Multi AV Scanner detection for dropped file 22->57 59 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 22->59 file9 signatures10 process11
Threat name:
Win32.Trojan.Suschil
Status:
Malicious
First seen:
2025-05-04 01:00:09 UTC
File Type:
PE (Exe)
Extracted files:
7
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
donut_injector
Similar samples:
Result
Malware family:
donutloader
Score:
  10/10
Tags:
family:donutloader discovery execution loader
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Checks computer location settings
Executes dropped EXE
Command and Scripting Interpreter: PowerShell
Detects DonutLoader
DonutLoader
Donutloader family
Verdict:
Malicious
Tags:
Win.Packed.Zusy-10014517-0
YARA:
n/a
Unpacked files
SH256 hash:
aa85e090de33a23971de4a85cdfe2e2efa32f85ebbbf4ffd53e2945a9ffa8494
MD5 hash:
d792303512b4d6a764e389e8c198f236
SHA1 hash:
c1b4bfadc0b9e4065e474e59ff3e55d619f160e7
SH256 hash:
f16a529b3b84bafc0a5a274c8220c5db43ff1ed60a5babd558b3c81ae792a8b5
MD5 hash:
d9e69ee304e41dafb17de5c835de1e0a
SHA1 hash:
9bc08b34d7bc8d8ccb8be63a5b42c491eb42c069
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DonutLoader

Executable exe aa85e090de33a23971de4a85cdfe2e2efa32f85ebbbf4ffd53e2945a9ffa8494

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
GDI_PLUS_APIInterfaces with Graphicsgdiplus.dll::GdiplusStartup
gdiplus.dll::GdiplusShutdown
gdiplus.dll::GdipAlloc
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::AllocConsole
KERNEL32.dll::AttachConsole
KERNEL32.dll::WriteConsoleW
KERNEL32.dll::FreeConsole
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateHardLinkW
KERNEL32.dll::CreateFileW
KERNEL32.dll::CreateFileMappingW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
KERNEL32.dll::MoveFileExW

Comments