MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d659ad9d00570077e5918aa2f53783c5e5b105ef10c7f776496332527776fc58. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



OffLoader


Vendor detections: 14


Intelligence 14 IOCs YARA 10 File information Comments

SHA256 hash: d659ad9d00570077e5918aa2f53783c5e5b105ef10c7f776496332527776fc58
SHA3-384 hash: 6d6ec95e4427f0dc096648970afc8f270ca636b22ce1565f3d486998bac608f44493892f7fe280e66d35fe3d1d4e6f25
SHA1 hash: feb19aca40b37cc1296320c0370114719b5c2a0e
MD5 hash: 0b498eb9b52afe6635125825908a2459
humanhash: november-table-uranus-violet
File name:Egzgxemc_2025.12.20_11.57.07_SETUP.exe
Download: download sample
Signature OffLoader
File size:15'886'442 bytes
First seen:2025-12-21 06:53:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ac4ded70f85ef621e5f8917b250855be (80 x OffLoader, 7 x Gh0stRAT, 6 x Tofsee)
ssdeep 393216:73onYV8c7oSG/vKb/Uok0UMokfH3icPXj2wa:roYfBCyjiCXicZa
TLSH T1E1F63337B28A673EF02E463715F3C2205D7B7961A51E8C4A97E00C8CCF6A5602E7E657
TrID 49.8% (.EXE) Inno Setup installer (107240/4/30)
20.0% (.EXE) InstallShield setup (43053/19/16)
19.3% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
4.8% (.EXE) Win64 Executable (generic) (10522/11/4)
2.0% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon 62e0d8e6928aeaea (1 x OffLoader)
Reporter Ling
Tags:exe Malgent OffLoader Trojan:Win32/Malgent!MSR


Avatar
CNGaoLing
This sample has been analyzed by Microsoft researchers and determined to be malware. (Trojan:Win32/Malgent!MSR)

Intelligence


File Origin
# of uploads :
1
# of downloads :
107
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Egzgxemc_2025.12.20_11.57.07_SETUP.exe
Verdict:
Malicious activity
Analysis date:
2025-12-20 21:28:37 UTC
Tags:
rat stealer zgrat netreactor purehvnc rust

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
shellcode asyncrat keylog word
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context anti-debug embarcadero_delphi fingerprint inno installer installer installer-heuristic overlay packed tofsee zero
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-12-20T18:43:00Z UTC
Last seen:
2025-12-23T04:42:00Z UTC
Hits:
~10
Detections:
Trojan.MSIL.Donut.sb Trojan.MSIL.Crypt.sb HEUR:Trojan.Win32.Generic HEUR:Trojan.MSIL.Cryptos.gen Trojan.Win32.Shellcode.sb Trojan.Win32.Shellcode.jsy Trojan.Win64.Agent.smfgcf
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.Malgent
Status:
Malicious
First seen:
2025-12-21 00:28:00 UTC
File Type:
PE (Exe)
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
unc_loader_078
Similar samples:
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery installer
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Inno Setup is an open-source installation builder for Windows applications.
System Location Discovery: System Language Discovery
Executes dropped EXE
Loads dropped DLL
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
d659ad9d00570077e5918aa2f53783c5e5b105ef10c7f776496332527776fc58
MD5 hash:
0b498eb9b52afe6635125825908a2459
SHA1 hash:
feb19aca40b37cc1296320c0370114719b5c2a0e
SH256 hash:
165c936de21abb5b14bb8e854fd0704e724368c78ee1e5a2f99357b8da31c5b2
MD5 hash:
89ca80717cbd7bb17b4a028194fa02cd
SHA1 hash:
2d60154b8598594228a24bdeb7d8c0e5a9ca5997
SH256 hash:
388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
MD5 hash:
e4211d6d009757c078a9fac7ff4f03d4
SHA1 hash:
019cd56ba687d39d12d4b13991c9a42ea6ba03da
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:NET
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:pe_imphash
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:Windows_Generic_Threat_c9003b7b
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

OffLoader

Executable exe d659ad9d00570077e5918aa2f53783c5e5b105ef10c7f776496332527776fc58

(this sample)

  
Delivery method
Distributed via web download

Comments