MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b1963848120a2c7b31a6a816a09c0d7391b5cca1e3234a2f92adccb8bbeca2ed. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LClipper


Vendor detections: 15


Intelligence 15 IOCs YARA 6 File information Comments

SHA256 hash: b1963848120a2c7b31a6a816a09c0d7391b5cca1e3234a2f92adccb8bbeca2ed
SHA3-384 hash: 31159b27dcb50f43f24df350b82137676f260ea79b2f8197b53de48e32e2b28e0e293ec0a47d58887fec5dc7702c9fd0
SHA1 hash: 223b6911a5fd511fb6068e2bac96510041a3b375
MD5 hash: 893fa59d7b5eb2c36f270e40c1df64f1
humanhash: blue-johnny-vermont-georgia
File name:file
Download: download sample
Signature LClipper
File size:651'264 bytes
First seen:2026-02-03 01:16:26 UTC
Last seen:2026-02-03 02:19:37 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'754 x AgentTesla, 19'662 x Formbook, 12'252 x SnakeKeylogger)
ssdeep 6144:57L9gg/62WcaLDC02yzsXjCn8o0CC8OhrhajycWaMN+VO3YHlZWHEnlKS:kgGLex08oBLO2WaDnll
TLSH T134D46C91AE85CA53C9370EB547B6C33883B6DFB8BD534307A4BB7E2DBC366452901252
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter Bitsight
Tags:BB1.file dropped-by-gcleaner exe f LClipper


Avatar
Bitsight
url: http://195.178.136.38/service

Intelligence


File Origin
# of uploads :
3
# of downloads :
154
Origin country :
US US
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
_b1963848120a2c7b31a6a816a09c0d7391b5cca1e3234a2f92adccb8bbeca2ed.exe
Verdict:
Malicious activity
Analysis date:
2026-02-03 01:17:37 UTC
Tags:
ta558 apt payload stegocampaign loader reverseloader stego evasion lclipper clipper auto-reg

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
xtreme shell sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% directory
Creating a process from a recently created file
Creating a window
Launching a process
Creating a process with a hidden window
Сreating synchronization primitives
Creating a file
DNS request
Connection attempt
Sending an HTTP GET request
Connection attempt to an infection source
Sending an HTTP GET request to an infection source
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 cscript lolbin powershell
Verdict:
Malicious
File Type:
exe x32
Detections:
Trojan-Downloader.Agent.HTTP.ServerRequest Trojan-Banker.Script.Emotet.sb HEUR:Trojan.Script.Generic Trojan.JS.SAgent.sb Trojan-Downloader.SLoad.TCP.ServerRequest Trojan.Agentb.TCP.C&C Trojan.Agent.HTTP.C&C HEUR:Trojan.MSIL.Alien.gen Trojan-Downloader.PowerShell.NanoShield.sb HEUR:Trojan.Multi.Stego.gen
Verdict:
Malware
YARA:
11 match(es)
Tags:
.Net DeObfuscated Executable Managed .NET Obfuscated PE (Portable Executable) PE File Layout SOS: 0.55 T1059.005 VBScript Win 32 Exe WScript.Network wscript.shell x86
Threat name:
Win32.Trojan.Marsilia
Status:
Malicious
First seen:
2026-02-03 01:17:36 UTC
File Type:
PE (.Net Exe)
Extracted files:
42
AV detection:
9 of 24 (37.50%)
Threat level:
  5/5
Result
Malware family:
lclipper
Score:
  10/10
Tags:
family:lclipper discovery execution persistence stealer
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Network Configuration Discovery: Internet Connection Discovery
Suspicious use of SetThreadContext
Adds Run key to start application
Command and Scripting Interpreter: PowerShell
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Badlisted process makes network request
LClipper
Lclipper family
Malware Config
C2 Extraction:
https://api.telegram.org/bot7841921350:AAFGkor-dSPkf-PgNgU6DqA2BBmIM8f_vRU/sendMessage?chat_id=6299414420&text=
Unpacked files
SH256 hash:
b1963848120a2c7b31a6a816a09c0d7391b5cca1e3234a2f92adccb8bbeca2ed
MD5 hash:
893fa59d7b5eb2c36f270e40c1df64f1
SHA1 hash:
223b6911a5fd511fb6068e2bac96510041a3b375
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_PS1_JAB_Pattern_Jun22_1
Author:Florian Roth (Nextron Systems)
Description:Detects suspicious UTF16 and Base64 encoded PowerShell code that starts with a $ sign and a single char variable
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LClipper

Executable exe b1963848120a2c7b31a6a816a09c0d7391b5cca1e3234a2f92adccb8bbeca2ed

(this sample)

  
Dropped by
Gcleaner
  
Delivery method
Distributed via web download

Comments