MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ab54862f180b379cb8d612fbb22891402e7d55151dba87e7b11e45c5e45b6d7c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gamaredon


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: ab54862f180b379cb8d612fbb22891402e7d55151dba87e7b11e45c5e45b6d7c
SHA3-384 hash: e510fe9a3471a919b33b3340bc95b766b69860025112db7df338c5dbf898b9cb11372c885f7d481654a3e03d19e5dc5a
SHA1 hash: 171aea9d91b6bdfb2177b632d0ae223fcd82e397
MD5 hash: 537dcb0f73ce1aebd7b5f07f4fcaff44
humanhash: video-social-steak-maine
File name:2-1180-25_24.06.2025.rar
Download: download sample
Signature Gamaredon
File size:10'991 bytes
First seen:2025-06-27 10:42:22 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 192:f0YJVCA4tm1K321Q7609633s2NDgRhwCgqDsQubVc9TzbzNVZW00y8e+HYxSsHyA:MgX4c1h1U9633KRSFqDsQbjJVb+HUGg
TLSH T16032BF04448AF326DFB943771019FF4B87DEF4F945A62C50736EA4F45CC98670978688
Magika zip
Reporter smica83
Tags:apt gamaredon UKR zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
89
Origin country :
HU HU
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:2-1180-25_24.06.2025.HTA
File size:4'021 bytes
SHA256 hash: 8fe70f3db6d119b85b849272d30b8aee47b310dad42ecbd6e43da8612a38423d
MD5 hash: d6e929a773257b1c36f40498720b958d
MIME type:text/html
Signature Gamaredon
Vendor Threat Intelligence
Verdict:
Malicious
Score:
70%
Tags:
virus spawn sage
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Payload URLs
URL
File name
https://forgeryGm3.com
HTA File
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
lolbin mshta obfuscated
Verdict:
inconclusive
YARA:
2 match(es)
Tags:
Zip Archive
Threat name:
Script-WScript.Trojan.Gamaredon
Status:
Malicious
First seen:
2025-06-24 12:11:36 UTC
File Type:
Binary (Archive)
Extracted files:
2
AV detection:
9 of 24 (37.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Checks computer location settings
Blocklisted process makes network request
Malware Config
Dropper Extraction:
http://print-documents.freedynamicdns.net/SS/atomN2s/rewardU26.jpeg
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments