MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d62975d9c56bfcf182d2341c7cf01ea07503b3a00d2d89bc77274d779973de9c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 12
| SHA256 hash: | d62975d9c56bfcf182d2341c7cf01ea07503b3a00d2d89bc77274d779973de9c |
|---|---|
| SHA3-384 hash: | c354d1165b0542f5eb4d04f97a484b5e301cba681faf356b9b7943d08026700cee5d075c9eb4df222e20ff1d826cbc24 |
| SHA1 hash: | daa8785fb7e60a52e41ba17aee4d3c8949ab5e02 |
| MD5 hash: | 6b3cee28554f2c1a68b3c0188b563931 |
| humanhash: | virginia-florida-kentucky-seven |
| File name: | 99999.msi |
| Download: | download sample |
| File size: | 84'614'144 bytes |
| First seen: | 2026-02-12 13:58:44 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-msi |
| ssdeep | 1572864:gXouVnBos95DgRC/eFckvh04JvSb58t3JrqM4LY1bO7SpE63/x9P:XuD95UCGSX49SU3JSM167SvJ9 |
| Threatray | 705 similar samples on MalwareBazaar |
| TLSH | T1EC083322B15B59A8DA1F233FE0A8EF8845347CA1B31799BBB37C7F6546B158311B1903 |
| TrID | 80.0% (.MSI) Microsoft Windows Installer (454500/1/170) 10.7% (.MST) Windows SDK Setup Transform script (61000/1/5) 7.8% (.MSP) Windows Installer Patch (44509/10/5) 1.4% (.) Generic OLE2 / Multistream Compound (8000/1) |
| Magika | msi |
| Reporter | |
| Tags: | Malgent msi Trojan:Win32/Malgent!MSR |
CNGaoLing
This sample has been reviewed by Microsoft researchers and determined to be malware. (Trojan:Win32/Malgent!MSR)Intelligence
File Origin
# of uploads :
1
# of downloads :
60
Origin country :
USVendor Threat Intelligence
Verdict:
Malicious
Score:
90.2%
Tags:
virus blic
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
anti-debug at base64 CAB cmd crypto donut evasive expand expired-cert expired-cert fingerprint installer large-file lolbin lolbin msiexec obfuscated runonce wix
Result
Verdict:
MALICIOUS
Link:
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
File Type:
msi
First seen:
2026-02-11T13:18:00Z UTC
Last seen:
2026-02-13T10:21:00Z UTC
Hits:
~100
Detections:
Trojan.Win32.AutoRun.sb HEUR:Trojan.OLE2.Autorun.gen Trojan.Win32.Shellcode.sb Trojan.Win32.DLLhijack.aeif BSS:Trojan.Win32.Generic Trojan.Win32.Inject.sb Trojan.Win32.Agent.sb Trojan.Win32.DLLhijack.sb Trojan.Win32.DLLhijack.aeie
Score:
58%
Verdict:
Susipicious
File Type:
ARCHIVE
Gathering data
Verdict:
Malicious
Threat:
Trojan.Win32.DLLhijack
Threat name:
Win32.Exploit.DonutMarte
Status:
Malicious
First seen:
2026-02-11 19:59:15 UTC
File Type:
Binary (Archive)
Extracted files:
129078
AV detection:
8 of 23 (34.78%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
donutloader
Similar samples:
+ 695 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
7/10
Tags:
discovery persistence privilege_escalation
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Event Triggered Execution: Installer Packages
System Location Discovery: System Language Discovery
Enumerates connected drives
Loads dropped DLL
Malware family:
DonutLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
msi d62975d9c56bfcf182d2341c7cf01ea07503b3a00d2d89bc77274d779973de9c
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.