MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 af860c5ce9401a7fed857169da9522966b5a5269b2a8a030aaf902299947eb5b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: af860c5ce9401a7fed857169da9522966b5a5269b2a8a030aaf902299947eb5b
SHA3-384 hash: fa8bd14d5dc0f981c658daf7e818cdd0d6287cf58432a08deb152a69f6587dbdf04abd43180ee43862e6f4df64ef55cc
SHA1 hash: 3dbbdf68953fa4defd6686f6fa4e4f08665b855f
MD5 hash: 02b1394a8ee31ed7770e275b060b0837
humanhash: quebec-minnesota-magnesium-black
File name:2-1180-25_24.06.2025.HTA
Download: download sample
File size:4'183 bytes
First seen:2025-06-24 15:20:58 UTC
Last seen:Never
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 96:bfAsYb68ABejMBDdyue7xEtjF/o/5/b/I/m/0/D/qLAsQCFWP8MWIglHk63d:xYb686mMyv7xEt+7HFWP4nHk6t
TLSH T1BE81CC8D3C8D66204293B19EC8B199C41C2F2905BA3647D22F31B74B21D7BD4E52AF3B
Magika vba
Reporter abuse_ch
Tags:hta

Intelligence


File Origin
# of uploads :
1
# of downloads :
53
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.2%
Tags:
phishing spawn overt sage
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Payload URLs
URL
File name
https://lydiapvJ.com
HTA File
Behaviour
BlacklistAPI detected
Result
Threat name:
n/a
Detection:
suspicious
Classification:
troj
Score:
22 / 100
Signature
Uses dynamic DNS services
Behaviour
Behavior Graph:
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
Html
Threat name:
Script-WScript.Trojan.Gamaredon
Status:
Malicious
First seen:
2025-06-24 07:30:06 UTC
File Type:
Text (HTML)
Extracted files:
1
AV detection:
7 of 24 (29.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Checks computer location settings
Blocklisted process makes network request
Malware Config
Dropper Extraction:
http://google.com@document-downloads.ddns.net/OD/quitzU2/comparativelyNWU.jpeg
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments