MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b1317e779900e35e0e0bc965776dfd4f26bcd27a9709ca73fa13606dc6e7d7c7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuirkyLoader


Vendor detections: 13


Intelligence 13 IOCs YARA 20 File information Comments

SHA256 hash: b1317e779900e35e0e0bc965776dfd4f26bcd27a9709ca73fa13606dc6e7d7c7
SHA3-384 hash: b562a4ad08c1f4922f6a1eafd8a9e2a728281e6bb1bc609172a3b318ee4704f2ace34bfc69bccce07c550f400ecfe2b1
SHA1 hash: 3be8d58326adb23eb48eb61c3213f9b3ab93d54e
MD5 hash: 45f71b40a4652d34f6cbaeb7dfe862b8
humanhash: pasta-alabama-beryllium-stream
File name:scvhost.dll
Download: download sample
Signature QuirkyLoader
File size:6'595'072 bytes
First seen:2026-03-18 20:26:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9c982684232e3382c1a71cda826895d6 (1 x QuirkyLoader)
ssdeep 49152:0B6/GJSKxWGHMo8NDtrwtA85LmExGyXTv1XfHbQi3e5bJAZ1ySod1byAC9ScppzO:S88lKc5UyXJV3e5WppzXwEJyDETi
TLSH T1FC669D14A3E801A5E57BDB34CA15C333CAB07DA25635D10F0998F2462F73A62DB6F726
TrID 37.0% (.EXE) Win64 Executable (generic) (6522/11/2)
28.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
11.5% (.EXE) OS/2 Executable (generic) (2029/13)
11.3% (.EXE) Generic Win/DOS Executable (2002/3)
11.3% (.EXE) DOS Executable (generic) (2000/1)
Magika pebin
Reporter smica83
Tags:exe QuirkyLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
131
Origin country :
HU HU
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
nvcertinjector.exe
Verdict:
Malicious activity
Analysis date:
2026-03-17 21:49:19 UTC
Tags:
pastebin websocket

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
shell sage hype
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Running batch commands
Creating a process with a hidden window
DNS request
Sending a custom TCP request
Launching a process
Sending an HTTP GET request
Using the Windows Management Instrumentation requests
Searching for synchronization primitives
Creating a file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Gathering data
Verdict:
Malicious
File Type:
exe x64
Detections:
Trojan.Win32.Scar.upjj PDM:Trojan.Win32.Generic
Malware family:
QuirkyLoader
Verdict:
Malicious
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj
Score:
60 / 100
Signature
AI detected malicious Powershell script
Connects to a pastebin service (likely for C&C)
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1886011 Sample: scvhost.dll.exe Startdate: 18/03/2026 Architecture: WINDOWS Score: 60 71 pastebin.com 2->71 73 Multi AV Scanner detection for submitted file 2->73 75 AI detected malicious Powershell script 2->75 77 Joe Sandbox ML detected suspicious sample 2->77 9 scvhost.dll.exe 1 3 2->9         started        12 MsEdgeUpdaterV2.exe 2->12         started        14 MsEdgeUpdaterV2.exe 2->14         started        signatures3 79 Connects to a pastebin service (likely for C&C) 71->79 process4 file5 65 C:\Users\user\AppData\...\MsEdgeUpdaterV2.exe, PE32+ 9->65 dropped 16 MsEdgeUpdaterV2.exe 5 9->16         started        19 cmd.exe 1 12->19         started        21 cmd.exe 1 12->21         started        23 cmd.exe 12->23         started        25 cmd.exe 14->25         started        27 cmd.exe 14->27         started        29 cmd.exe 14->29         started        process6 dnsIp7 67 144.31.107.20, 49694, 49696, 49704 UAMS-ASNUS United States 16->67 69 pastebin.com 172.66.171.73, 443, 49693, 49695 CLOUDFLARENETUS United States 16->69 31 cmd.exe 1 16->31         started        33 cmd.exe 1 16->33         started        35 cmd.exe 1 16->35         started        37 12 other processes 19->37 39 2 other processes 21->39 41 2 other processes 23->41 43 9 other processes 25->43 45 2 other processes 27->45 47 2 other processes 29->47 process8 process9 49 tasklist.exe 1 31->49         started        51 tasklist.exe 1 31->51         started        53 conhost.exe 31->53         started        63 14 other processes 31->63 55 powershell.exe 7 33->55         started        57 conhost.exe 33->57         started        59 powershell.exe 7 35->59         started        61 conhost.exe 35->61         started       
Gathering data
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2026-03-18 06:28:32 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
11 of 38 (28.95%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion discovery execution persistence
Behaviour
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
Enumerates processes with tasklist
Adds Run key to start application
Contacts third-party web service commonly abused for C2
Executes dropped EXE
Unpacked files
SH256 hash:
b1317e779900e35e0e0bc965776dfd4f26bcd27a9709ca73fa13606dc6e7d7c7
MD5 hash:
45f71b40a4652d34f6cbaeb7dfe862b8
SHA1 hash:
3be8d58326adb23eb48eb61c3213f9b3ab93d54e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__MemoryWorkingSet
Author:Fernando Mercês
Description:Anti-debug process memory working set size check
Reference:http://www.gironsec.com/blog/2015/06/anti-debugger-trick-quicky/
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:detect_powershell
Author:daniyyell
Description:Detects suspicious PowerShell activity related to malware execution
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_SUSPICIOUS_EXE_RawPaste_URL
Author:ditekSHen
Description:Detects executables (downlaoders) containing URLs to raw contents of a paste
Rule name:Jupyter_infostealer
Author:CD_R0M_
Description:Rule for Jupyter Infostealer/Solarmarker malware from september 2021-December 2022
Rule name:Lumma_Stealer_Detection
Author:ashizZz
Description:Detects a specific Lumma Stealer malware sample using unique strings and behaviors
Reference:https://seanthegeek.net/posts/compromized-store-spread-lumma-stealer-using-fake-captcha/
Rule name:NET
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Reference:https://cyfare.net/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments