MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 dacf404f18ed74e385ac6e44d264222ce138a16de81e6c1e9a45c3016c63588b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
YoungLotus
Vendor detections: 14
| SHA256 hash: | dacf404f18ed74e385ac6e44d264222ce138a16de81e6c1e9a45c3016c63588b |
|---|---|
| SHA3-384 hash: | 6269a0bf75fd5310d6b8d9eddc0ea2118087ddb1da5d42d4656e27f9c245336643ff44c733ae17f89ca724077898c0fb |
| SHA1 hash: | 7a5b5639deb1345071f01d2cd7931a185de43c71 |
| MD5 hash: | e53b2cdaccb9748bfe45d7525a595de3 |
| humanhash: | leopard-robin-monkey-september |
| File name: | A093D80F.exe |
| Download: | download sample |
| Signature | YoungLotus |
| File size: | 2'121'815 bytes |
| First seen: | 2023-07-06 11:30:07 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 54b505207e3a17e4d06cf545b172c830 (1 x YoungLotus) |
| ssdeep | 24576:EiLoRBTHMOqdkILizvSKp+iS4FG3r6xoEo8nu5E/:EisRB4OQYSKciSeG3OxoEoSu+ |
| Threatray | 9 similar samples on MalwareBazaar |
| TLSH | T12DA55B10D186801FC9A719BACEBFB2EC6548BE407F4611C3628C3A5DDBBB4D17A3586D |
| TrID | 37.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 20.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 12.7% (.EXE) Win64 Executable (generic) (10523/12/4) 7.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 6.1% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| File icon (PE): | |
| dhash icon | a1a5a585b525b5b5 (1 x YoungLotus) |
| Reporter | |
| Tags: | exe younglotus |
Intelligence
File Origin
HKVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | BitcoinAddress |
|---|---|
| Author: | Didier Stevens (@DidierStevens) |
| Description: | Contains a valid Bitcoin address |
| Rule name: | command_and_control |
|---|---|
| Author: | CD_R0M_ |
| Description: | This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group |
| Rule name: | meth_stackstrings |
|---|---|
| Author: | Willi Ballenthin |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.