MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aaa7320e258c24a6da855496639eb25766bb85ad6979fc8bf06efa53ea00036a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Meterpreter


Vendor detections: 15


Intelligence 15 IOCs YARA 23 File information Comments

SHA256 hash: aaa7320e258c24a6da855496639eb25766bb85ad6979fc8bf06efa53ea00036a
SHA3-384 hash: 4698d6ca18358d8f97dc619b03e0003b1ba3c1029da6b15b26ab64f6c6086ca005b85e7450e516e12d765f62ca34fe1e
SHA1 hash: 1839f262cea6eeb8985f3358eedf522379a143dd
MD5 hash: 57f4e3a665e2d98d98e274ad9d24633c
humanhash: bravo-maryland-montana-purple
File name:officefonts.dll
Download: download sample
Signature Meterpreter
File size:267'264 bytes
First seen:2026-05-16 17:58:32 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 57d6e7112c8e716cfe2eb0ff9f36763c (16 x Meterpreter, 2 x CobaltStrike, 2 x Cobalt Strike)
ssdeep 3072:LPiuOg6imUsz7L1VwtuaLjFzzvFylQXM0rvPpqYsGbRDOnjd+Ug6dUjHtVL:TiuOW9tDzzfXM0zMGbExoJjNVL
Threatray 6 similar samples on MalwareBazaar
TLSH T19C449D12B4C28072D1BF053101779F225FBC7D601BB89DAB8BA85DA90F755C0E635BAB
TrID 50.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
10.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.5% (.EXE) Win64 Executable (generic) (6522/11/2)
8.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.2% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter smica83
Tags:dll Meterpreter microwaved-info

Intelligence


File Origin
# of uploads :
1
# of downloads :
107
Origin country :
HU HU
Vendor Threat Intelligence
Malware configuration found for:
PECrypter
Details
PECrypter
extracted PE file component(s) (plaintext) from the .data section
Verdict:
Malicious
Score:
99.9%
Tags:
emotet dorv
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
crypto exploit lolbin meterpreter microsoft_visual_cc rundll32 swrort
Verdict:
Malicious
Labled as:
Dump:Generic.ShellCode.Marte.2
Verdict:
Malicious
File Type:
dll x32
First seen:
2026-05-13T10:19:00Z UTC
Last seen:
2026-05-17T18:22:00Z UTC
Hits:
~100
Detections:
HEUR:Trojan.Win64.Shelma.a HEUR:Backdoor.Win64.Mtrprtr.a Backdoor.Win64.Meterpreter.c PDM:Trojan.Win32.Generic Trojan.Win64.Shelm.sb Trojan.Win32.Yakes Trojan.Win32.Inject.sb Trojan.Win32.Agent.sb
Malware family:
Metasploit Framework
Verdict:
Malicious
Result
Threat name:
Meterpreter
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Rundll32 Execution Without Parameters
System process connects to network (likely due to code injection or exploit)
Yara detected Meterpreter
Behaviour
Behavior Graph:
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Malware.Heuristic
Status:
Malicious
First seen:
2026-05-14 10:13:25 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
29 of 36 (80.56%)
Threat level:
  2/5
Gathering data
Unpacked files
SH256 hash:
aaa7320e258c24a6da855496639eb25766bb85ad6979fc8bf06efa53ea00036a
MD5 hash:
57f4e3a665e2d98d98e274ad9d24633c
SHA1 hash:
1839f262cea6eeb8985f3358eedf522379a143dd
Detections:
triage_cobaltstrike_sc_rot13 triage_meterpreter
SH256 hash:
c4b361630a21b7d1f7c8df448ff58ebac645771fa46abdb71984eeaf3fbda7ed
MD5 hash:
cd12ff457ebedf5df284493f358a57fa
SHA1 hash:
6e5173e3e7f5c8c69eb0c4d82e5167fb13794abe
Detections:
triage_cobaltstrike_sc_rot13 triage_meterpreter
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:MALWARE_Win_Meterpreter
Author:ditekSHen
Description:Detects Meterpreter payload
Rule name:meth_peb_parsing
Author:Willi Ballenthin
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.
Rule name:Windows_Trojan_Metasploit_0cc81460
Author:Elastic Security
Rule name:Windows_Trojan_Metasploit_38b8ceec
Description:Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon).
Rule name:Windows_Trojan_Metasploit_38b8ceec
Author:Elastic Security
Description:Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon).
Rule name:Windows_Trojan_Metasploit_7bc0f998
Description:Identifies the API address lookup function leverage by metasploit shellcode
Rule name:Windows_Trojan_Metasploit_7bc0f998
Author:Elastic Security
Description:Identifies the API address lookup function leverage by metasploit shellcode
Rule name:Windows_Trojan_Metasploit_c9773203
Description:Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.
Reference:https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm
Rule name:Windows_Trojan_Metasploit_c9773203
Author:Elastic Security
Description:Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.
Reference:https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Meterpreter

DLL dll aaa7320e258c24a6da855496639eb25766bb85ad6979fc8bf06efa53ea00036a

(this sample)

  
Delivery method
Distributed via web download

Comments