MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cd4807739ed630631defac9dc0e517ba94c88977dac9692d797477d32e99c15a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA 4 File information Comments

SHA256 hash: cd4807739ed630631defac9dc0e517ba94c88977dac9692d797477d32e99c15a
SHA3-384 hash: 86a605b8dc55881bc33f4a4abf6502abbf33377210c0cc69710d5d781442f960924ca90be4d5490b9a12d239c2c02f81
SHA1 hash: 72e25ca9380d7e69732ab39120209700c4f8e0d8
MD5 hash: eaa7debe272bb6e118761eaf3119f293
humanhash: vegan-football-william-maryland
File name:midas.dll
Download: download sample
File size:297'984 bytes
First seen:2026-03-18 05:40:11 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 862da41bcfbd7abb2760e900e2ec77ad
ssdeep 6144:L/FFJOF5+++QNngrA2tfMlRTKaQI6NLzXd5wdBwjq:L/k5++rNnKGdU
TLSH T1E5547D01B951C235C05001F05D39BB317A7EBE696B3DA68733C9B9AC9FB2360AF42257
TrID 27.8% (.EXE) DOS Executable Borland C++ (13007/5/3)
21.4% (.EXE) DOS Borland compiled Executable (generic) (10000/1/2)
14.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
13.9% (.EXE) Win64 Executable (generic) (6522/11/2)
9.6% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter jesseh140
Tags:dll

Intelligence


File Origin
# of uploads :
1
# of downloads :
127
Origin country :
US US
Vendor Threat Intelligence
No detections
Result
Verdict:
Clean
Maliciousness:
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-debug base64 borland_c fingerprint packed
Verdict:
Clean
File Type:
PE/Dll
First seen:
2010-07-23T08:49:00Z UTC
Last seen:
2026-02-13T16:04:00Z UTC
Hits:
~10000
Gathering data
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Unpacked files
SH256 hash:
cd4807739ed630631defac9dc0e517ba94c88977dac9692d797477d32e99c15a
MD5 hash:
eaa7debe272bb6e118761eaf3119f293
SHA1 hash:
72e25ca9380d7e69732ab39120209700c4f8e0d8
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:Check_OutputDebugStringA_iat
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments