MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ab9aeb8492a9365f5a9c5facdd905c7d55e4c47d54482e331755cd21ce0e0777. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA 5 File information Comments

SHA256 hash: ab9aeb8492a9365f5a9c5facdd905c7d55e4c47d54482e331755cd21ce0e0777
SHA3-384 hash: cab32e172133bc5b102fcfa34650b34362728b5aed0058730c77a04d2ab3089dcd8253cfe90ce9c955e733c4fb685c8e
SHA1 hash: d54d6efa6522b00102c4c580841b9144673f801e
MD5 hash: 46046a335bca6946e68231071ac796b5
humanhash: aspen-happy-arkansas-california
File name:SecuriteInfo.com.Win32.MalwareX-gen.85665951
Download: download sample
File size:1'203'200 bytes
First seen:2026-02-13 08:23:55 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'818 x AgentTesla, 19'741 x Formbook, 12'286 x SnakeKeylogger)
ssdeep 24576:A2RuBRKJdqpxvYJ6SSunZ+mTh1uwain4VPn9Ly72g4FpnA:zRu73q6SSusUywaI4F9M2g4Y
TLSH T13845023A2B949412C9B0CFFA5B9BF37313244D94DA54C222FBE0FFAB75B2B184544196
TrID 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.0% (.EXE) Win64 Executable (generic) (10522/11/4)
6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.2% (.EXE) Win32 Executable (generic) (4504/4/1)
1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Magika pebin
Reporter SecuriteInfoCom
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
103
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Win32.MalwareX-gen.85665951
Verdict:
Malicious activity
Analysis date:
2026-02-13 08:38:08 UTC
Tags:
purehvnc netreactor

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
remcos virus micro msil
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-12-02T22:52:00Z UTC
Last seen:
2026-02-13T17:03:00Z UTC
Hits:
~1000
Verdict:
inconclusive
YARA:
11 match(es)
Tags:
.Net Executable Managed .NET PDB Path PE (Portable Executable) PE File Layout SOS: 0.23 Win 32 Exe x86
Threat name:
ByteCode-MSIL.Backdoor.Remcos
Status:
Malicious
First seen:
2025-12-03 02:12:22 UTC
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
discovery
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Unpacked files
SH256 hash:
ab9aeb8492a9365f5a9c5facdd905c7d55e4c47d54482e331755cd21ce0e0777
MD5 hash:
46046a335bca6946e68231071ac796b5
SHA1 hash:
d54d6efa6522b00102c4c580841b9144673f801e
SH256 hash:
daa105101c3eb72870a4f63c7286229fcd2f6013ba17a5bde9868ad8dcd63b83
MD5 hash:
33f4b432a48da18fe08b0764c73419ce
SHA1 hash:
3a6c033647755c4c81040ca981cfc59178c583b6
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
1dc973ad7bf18f882f2957f192d01cc9185628cfd3b30c1b208e0548a62b64fb
MD5 hash:
2e9ef2eb480a18de91ae4322af53754a
SHA1 hash:
5112fb4134e598660c32114876b15bc04155de00
SH256 hash:
bcf2fea3419902fc457328bef76e4dd33d4d41ce4361e83e7b6948ed7fdc4567
MD5 hash:
4af00248273a06dcd0747b5b4308a043
SHA1 hash:
85e0bbdc482df13352590f3e653e32f7a6d66d30
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments