MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b30f204245a9aa2c50226c7a8c5b71875e7dd3bd234bc90eff07b8e4fd94028f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: b30f204245a9aa2c50226c7a8c5b71875e7dd3bd234bc90eff07b8e4fd94028f
SHA3-384 hash: e74b2b903f3682e94ebfe2402f5c41b25aa72c55f2754081b44071bc4e7c064de5854bad51bb2f6228364894c170151b
SHA1 hash: a4244230d868ab5ce42aa73c1005ac9c6a17dacf
MD5 hash: d5c09da55170be5d1655106d812b6a43
humanhash: purple-finch-twelve-equal
File name:LRIOVUHD.msi
Download: download sample
File size:7'753'728 bytes
First seen:2025-04-09 12:23:13 UTC
Last seen:2025-04-09 13:05:18 UTC
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 196608:Ru80D0RG3wGYtQw4mdoGyO6PgHkKr28UgST2QiR7LWKZ:RunYM3stQwndoSUgHkKrlJFk
TLSH T14F76338664E98663D69FC535226D289C63738C6C5E148DEE37307AC9BA393710BC64F3
TrID 88.4% (.MST) Windows SDK Setup Transform script (61000/1/5)
11.5% (.) Generic OLE2 / Multistream Compound (8000/1)
Magika msi
Reporter JAMESWT_WT
Tags:booking brokpolok-shop cdn-jsdelivr-net msi

Intelligence


File Origin
# of uploads :
3
# of downloads :
79
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
81.4%
Tags:
shellcode spawn micro
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
installer wix
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Creates multiple autostart registry keys
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
PE file has a writeable .text section
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1660754 Sample: LRIOVUHD.msi Startdate: 09/04/2025 Architecture: WINDOWS Score: 100 116 werito.cyou 2->116 118 velvet5nssrv.shop 2->118 120 4 other IPs or domains 2->120 146 Malicious sample detected (through community Yara rule) 2->146 148 Antivirus detection for URL or domain 2->148 150 PE file has a writeable .text section 2->150 152 Joe Sandbox ML detected suspicious sample 2->152 11 msiexec.exe 85 45 2->11         started        14 msedge.exe 2->14         started        18 crashreporter.exe 2->18         started        20 2 other processes 2->20 signatures3 process4 dnsIp5 106 C:\Users\user\AppData\...\crashreporter.exe, PE32 11->106 dropped 108 C:\Users\user\AppData\Local\...\zlib1.dll, PE32 11->108 dropped 110 C:\Users\...\wxmsw313u_core_vc_custom.dll, PE32 11->110 dropped 114 6 other files (none is malicious) 11->114 dropped 22 crashreporter.exe 12 11->22         started        26 msiexec.exe 54 11->26         started        140 192.168.2.5 unknown unknown 14->140 142 239.255.255.250 unknown Reserved 14->142 180 Creates multiple autostart registry keys 14->180 182 Maps a DLL or memory area into another process 14->182 28 msedge.exe 14->28         started        31 identity_helper.exe 14->31         started        33 msedge.exe 14->33         started        37 2 other processes 14->37 112 C:\Users\user\AppData\Local\Temp\emidgxwq, PE32+ 18->112 dropped 35 conhost.exe 20->35         started        file6 signatures7 process8 dnsIp9 84 C:\Users\user\AppData\...\crashreporter.exe, PE32 22->84 dropped 86 C:\Users\user\AppData\Roaming\...\zlib1.dll, PE32 22->86 dropped 88 C:\Users\...\wxmsw313u_core_vc_custom.dll, PE32 22->88 dropped 96 6 other files (none is malicious) 22->96 dropped 168 Switches to a custom stack to bypass stack traces 22->168 170 Found direct / indirect Syscall (likely to bypass EDR) 22->170 39 crashreporter.exe 4 22->39         started        90 C:\Users\user\AppData\Local\...\Start.exe, PE32+ 26->90 dropped 92 C:\Users\user\AppData\Local\...\SbieDll.dll, PE32+ 26->92 dropped 94 C:\Users\user\AppData\...\_isres_0x0409.dll, PE32 26->94 dropped 98 2 other files (none is malicious) 26->98 dropped 43 Start.exe 26->43         started        45 ISBEW64.exe 26->45         started        47 ISBEW64.exe 26->47         started        51 8 other processes 26->51 134 ax-0003.ax-msedge.net 150.171.27.12, 443, 49774 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 28->134 136 c-msn-pme.trafficmanager.net 20.110.205.119, 443, 49769, 49791 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 28->136 138 27 other IPs or domains 28->138 49 Conhost.exe 31->49         started        file10 signatures11 process12 file13 100 C:\Users\user\AppData\...\updateBg_je2.exe, PE32+ 39->100 dropped 102 C:\Users\user\AppData\Local\Temp\tpd, PE32+ 39->102 dropped 172 Found hidden mapped module (file has been removed from disk) 39->172 174 Maps a DLL or memory area into another process 39->174 176 Switches to a custom stack to bypass stack traces 39->176 178 Found direct / indirect Syscall (likely to bypass EDR) 39->178 53 updateBg_je2.exe 3 2 39->53         started        57 cmd.exe 3 39->57         started        104 C:\Users\user\AppData\Local\...\cgbduktywwc, PE32+ 43->104 dropped 59 cmd.exe 43->59         started        61 cmd.exe 43->61         started        signatures14 process15 dnsIp16 122 velvet5nssrv.shop 104.21.87.199, 443, 49722, 49723 CLOUDFLARENETUS United States 53->122 124 werito.cyou 172.67.216.83, 443, 49725, 49838 CLOUDFLARENETUS United States 53->124 154 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 53->154 156 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 53->156 158 Tries to harvest and steal browser information (history, passwords, etc) 53->158 166 5 other signatures 53->166 63 chrome.exe 53->63         started        66 msiexec.exe 7 53->66         started        69 msedge.exe 53->69         started        160 Switches to a custom stack to bypass stack traces 57->160 71 conhost.exe 57->71         started        126 sonorous-horizon-cfd.cfd 104.21.64.1, 49804, 49852, 80 CLOUDFLARENETUS United States 59->126 162 Creates multiple autostart registry keys 59->162 164 Creates an autostart registry key pointing to binary in C:\Windows 59->164 73 conhost.exe 61->73         started        signatures17 process18 dnsIp19 144 192.168.2.4, 138, 443, 49311 unknown unknown 63->144 75 chrome.exe 63->75         started        80 C:\Users\user\AppData\Local\Temp\MSIE9F.tmp, PE32 66->80 dropped 82 C:\Users\user\AppData\Local\...\MSI10A3.tmp, PE32 66->82 dropped 78 msedge.exe 69->78         started        file20 process21 dnsIp22 128 www.google.com 142.250.64.100, 443, 49731, 49734 GOOGLEUS United States 75->128 130 plus.l.google.com 75->130 132 5 other IPs or domains 75->132
Result
Malware family:
n/a
Score:
  6/10
Tags:
discovery persistence privilege_escalation spyware stealer
Behaviour
Checks SCSI registry key(s)
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Browser Information Discovery
Enumerates physical storage devices
Event Triggered Execution: Installer Packages
Reads user/profile data of web browsers
System Location Discovery: System Language Discovery
Drops file in Windows directory
Executes dropped EXE
Loads dropped DLL
Suspicious use of SetThreadContext
Enumerates connected drives
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Malware family:
HijackLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Microsoft Software Installer (MSI) msi b30f204245a9aa2c50226c7a8c5b71875e7dd3bd234bc90eff07b8e4fd94028f

(this sample)

  
Delivery method
Distributed via web download

Comments