MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c79d047ec35399fbaf0059fae1e0639ffcc74ffb921a6daf75856b008385d0f8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 8 File information Comments

SHA256 hash: c79d047ec35399fbaf0059fae1e0639ffcc74ffb921a6daf75856b008385d0f8
SHA3-384 hash: a13bb811e9cb59d0fb0cdd4ad55e10498f5c92a31d7b8c00a450819c0b6109b6f901fa9e09b4d3bfda458469907c1c7b
SHA1 hash: 3af5c9345609c31dadeff4e3aee48b108ebf04e4
MD5 hash: ab78aecf86ddfe9ebeb146698f3ce0dd
humanhash: spring-washington-sierra-quebec
File name:18 node.dll
Download: download sample
File size:815'616 bytes
First seen:2026-01-10 09:24:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fee43ee650d6f5b413585563c42430c2
ssdeep 12288:tkCqF2VZKehnx2mwrzfJhogMd/krbCyYov:trqFeZ7hngPffoLVkrV
TLSH T1E1057E1EAB5402B8D17BE275CA574D02E772B80A13716ADF03E04A951F77BE01B3E71A
TrID 43.3% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
27.6% (.EXE) Win64 Executable (generic) (10522/11/4)
13.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.3% (.EXE) OS/2 Executable (generic) (2029/13)
5.2% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter JAMESWT_WT
Tags:91-215-85-42 exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
105
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
18 node.dll
Verdict:
No threats detected
Analysis date:
2026-01-10 09:24:40 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
81.4%
Tags:
emotet virus
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug base64 fingerprint masquerade microsoft_visual_cc
Verdict:
Clean
File Type:
dll x64
First seen:
2025-12-19T12:50:00Z UTC
Last seen:
2025-12-19T12:57:00Z UTC
Hits:
~10
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 64 Exe x64
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Unpacked files
SH256 hash:
c79d047ec35399fbaf0059fae1e0639ffcc74ffb921a6daf75856b008385d0f8
MD5 hash:
ab78aecf86ddfe9ebeb146698f3ce0dd
SHA1 hash:
3af5c9345609c31dadeff4e3aee48b108ebf04e4
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:dgaagas
Author:Harshit
Description:Uses certutil.exe to download a file named test.txt
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe c79d047ec35399fbaf0059fae1e0639ffcc74ffb921a6daf75856b008385d0f8

(this sample)

  
Delivery method
Distributed via web download

Comments