MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bf1330939818d083466cc5f720dd2dd7d0d3ca0513636429806371e378af088f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 13


Intelligence 13 IOCs YARA 10 File information Comments

SHA256 hash: bf1330939818d083466cc5f720dd2dd7d0d3ca0513636429806371e378af088f
SHA3-384 hash: af36fb205cfef373af6785f6e4d5b7491f7e617b57064553845ceb9ca4e729b7199813c19e633a62f9e8330fa8df9dc2
SHA1 hash: 6171436af227336a4b59723fd7e1494209032aef
MD5 hash: 252f0c1039a90846718bba3aea1876e5
humanhash: tennis-carbon-washington-carolina
File name:file
Download: download sample
File size:1'618'944 bytes
First seen:2026-02-28 21:10:39 UTC
Last seen:2026-03-01 09:46:04 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ac6665f6841c174b2de37e2cd0bc9023
ssdeep 24576:A5oacJz2HUgkXXRwGX5XVLcmbm2qE524GLD78h4CWK71uTQO/:A5bcJz8UgkXXNX5XVLFbm2vktd
TLSH T18A754B1BE2A385ECC12FD17486679772BA30B85D01347E2F1BA4DB311F21E909B5EB64
TrID 45.6% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
18.0% (.EXE) Win64 Executable (generic) (6522/11/2)
13.9% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.6% (.ICL) Windows Icons Library (generic) (2059/9)
5.6% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter Bitsight
Tags:dropped-by-amadey exe fbf543


Avatar
Bitsight
url: http://130.12.180.43/files/7316173289/zCg4Tsb.exe

Intelligence


File Origin
# of uploads :
15
# of downloads :
202
Origin country :
US US
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
_bf1330939818d083466cc5f720dd2dd7d0d3ca0513636429806371e378af088f.exe
Verdict:
Malicious activity
Analysis date:
2026-02-28 21:12:06 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
BasilisqueLocker
Verdict:
Malicious
Score:
94.9%
Tags:
vmdetect
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm anti-vm base64 evasive expand fingerprint hacktool lolbin mingw packed runonce schtasks
Verdict:
Malicious
File Type:
exe x64
Detections:
PDM:Trojan.Win32.Generic Trojan-Ransom.Win32.Encoder.sb Trojan-Ransom.Win32.Agent.sb Trojan-PSW.Win32.Stealer.sb Trojan.Win32.DelShad.sb Trojan.Win32.Agent.sb Trojan-PSW.Win64.Stealer.arpa
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Trojan.Egairtigado
Status:
Malicious
First seen:
2026-02-28 21:11:26 UTC
File Type:
PE+ (Exe)
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
genericransomware
Similar samples:
Result
Malware family:
n/a
Score:
  10/10
Tags:
credential_access defense_evasion discovery execution impact ransomware spyware stealer
Behaviour
Interacts with shadow copies
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Browser Information Discovery
Drops file in Program Files directory
Drops desktop.ini file(s)
Credentials from Password Stores: Windows Credential Manager
Reads user/profile data of web browsers
Deletes shadow copies
Renames multiple (9814) files with added filename extension
Unpacked files
SH256 hash:
bf1330939818d083466cc5f720dd2dd7d0d3ca0513636429806371e378af088f
MD5 hash:
252f0c1039a90846718bba3aea1876e5
SHA1 hash:
6171436af227336a4b59723fd7e1494209032aef
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_Qemu_DeviceMap
Rule name:Check_VBox_DeviceMap
Rule name:Check_VBox_VideoDrivers
Rule name:Check_VMWare_DeviceMap
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_SUSPICIOUS_VM_Evasion_VirtDrvComb
Author:ditekSHen
Description:Detects executables referencing combination of virtualization drivers
Rule name:pe_detect_tls_callbacks
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:Truncated_win10_x64_NativeSysCall
Author:SBousseaden
Description:hunt of at least 3 occurences of truncated win10 x64 NativeSyscall

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe bf1330939818d083466cc5f720dd2dd7d0d3ca0513636429806371e378af088f

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

Comments