MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d49ec81f7be6eaabac6d77e8bc43a8ec61d368af5caa75690b95c18a6d52bcf7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 14 File information Comments

SHA256 hash: d49ec81f7be6eaabac6d77e8bc43a8ec61d368af5caa75690b95c18a6d52bcf7
SHA3-384 hash: 70fc8c830319dcb5992ed98ff19b6d3f3e16f364a4a3dccceaac6da586115f242cc82558ba5f0ce914acdc5ec6886ba2
SHA1 hash: b98b545cce99a0b97ccc8ab1df6be6b8508ffa6d
MD5 hash: 488b0edfe8f0fc24cbec2dadbd378109
humanhash: failed-uncle-november-october
File name:Photoshop6.0 单文件版.exe
Download: download sample
File size:7'226'972 bytes
First seen:2025-12-25 02:12:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash de6185b8cdae1e84cb8f9add0b5f8afc
ssdeep 196608:1Kx7Fs3Aepnp0wU9rsX5X/TsB/mpW1POGtzCbb:u23AeFywOi/TsB/mEpOezw
TLSH T1E87633F4390E574DD0A0103163D7A44DCA14B3DA1E59FA8FE38E9A65EBDA7C3A07D092
TrID 32.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
28.9% (.EXE) Win32 Executable (generic) (4504/4/1)
13.0% (.EXE) OS/2 Executable (generic) (2029/13)
12.8% (.EXE) Generic Win/DOS Executable (2002/3)
12.8% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
dhash icon e6b8fcececa59a84
Reporter Ling
Tags:exe Tiggre Trojan:Win32/Tiggre!rfn


Avatar
CNGaoLing
This sample has been reviewed by Microsoft researchers and determined to be malware. (Trojan:Win32/Tiggre!rfn)

Intelligence


File Origin
# of uploads :
1
# of downloads :
119
Origin country :
US US
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
Photoshop6.0 单文件版.exe
Verdict:
Suspicious activity
Analysis date:
2025-12-25 02:14:09 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
trojware tiggre extens virus
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context installer-heuristic microsoft_visual_cc molebox overlay overlay packed packed rogue siggen6 unsafe
Verdict:
Clean
File Type:
exe x32
First seen:
2010-07-26T03:53:00Z UTC
Last seen:
2025-12-24T23:04:00Z UTC
Hits:
~1000
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.Tiggre
Status:
Malicious
First seen:
2011-07-05 19:06:00 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
18 of 36 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
System Location Discovery: System Language Discovery
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
d49ec81f7be6eaabac6d77e8bc43a8ec61d368af5caa75690b95c18a6d52bcf7
MD5 hash:
488b0edfe8f0fc24cbec2dadbd378109
SHA1 hash:
b98b545cce99a0b97ccc8ab1df6be6b8508ffa6d
SH256 hash:
703d6989ead0d067b58b504481ffafd74aae4b2a1e2acda1de5d28489ab4cd5b
MD5 hash:
bf8085e57365649655ef8148d9b02dc4
SHA1 hash:
3a044f1da03c569f69304f33daab5d76772e6a0c
SH256 hash:
3dc7e546cc3cb480f521e4aa651331be6a11ad9ed1ff815ffde95b9f0e9c39a2
MD5 hash:
a97efec6c5ecbec3bacd59cffa49f6bf
SHA1 hash:
6702ea9abde2d676d33536a6457a0e7239e6c22a
SH256 hash:
f2de4d1c8d2d2ae00cb848c38a99533e8027769b88a3a9f495ce71c936e0dbe4
MD5 hash:
41f6eb5fb7b7c1956b970c07eb72e84e
SHA1 hash:
698fe62bf64a4c179aed5e4dc9894e73e7e868ba
SH256 hash:
5e81cff9ae695be6b546c539f41e44e55fee7536319a3c30254c55fe30017952
MD5 hash:
6ccad150c421f9f7b808b1fcba43129c
SHA1 hash:
9e696f1b89c9097d660bddeee202881b876d9133
SH256 hash:
667daf3ea5acd18c9ae59b0676fc72d21b39a1fc077d968a883421ba78e188a1
MD5 hash:
96692cfcb25a2b72a8c5ac0d6de8c0ed
SHA1 hash:
c259f93607b48f63be4a60b2909817482c12ce08
SH256 hash:
8741eea46f9f1a99a18bfde34b224738efadaccf3c27916f1e62c1435956f623
MD5 hash:
19f16a30ec89d1d6adbf7bc0a804255a
SHA1 hash:
c56f95520b25c61829d82bad91988e9324d17d20
SH256 hash:
6c9933b9187760ac29027eb1db49c3015fbfd60fb162600325c6bc315c56291c
MD5 hash:
4655fe3bdb6be3c39089aaebf4a40726
SHA1 hash:
d8c6a7122e370619fabba893f11a73bf4df4d37b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:MoleBoxv20
Author:malware-lu
Rule name:MoleBoxV23XMoleStudiocom
Author:malware-lu
Rule name:NET
Author:malware-lu
Rule name:NsPackV2XLiuXingPing
Author:malware-lu
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:TeslaCryptPackedMalware
Rule name:TH_Generic_MassHunt_Win_Malware_2025_CYFARE
Author:CYFARE
Description:Generic Windows malware mass-hunt rule - 2025
Reference:https://cyfare.net/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe d49ec81f7be6eaabac6d77e8bc43a8ec61d368af5caa75690b95c18a6d52bcf7

(this sample)

  
Delivery method
Distributed via web download

Comments