MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ddfd45fd76607ba94debe6255019c8ceaaa1417ff3af3ca15cec029cc065750b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ConnectWise


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: ddfd45fd76607ba94debe6255019c8ceaaa1417ff3af3ca15cec029cc065750b
SHA3-384 hash: 7bbd8d1830d4d8d79d1c96c08f848c18da776553177c4fdd281f600c919241e347c94924729cba467e2442d517a25aa7
SHA1 hash: afaf246a910346cc0651edfad651e7af9811c313
MD5 hash: 65c7d2acea10a28dd17bd57c64ee351a
humanhash: helium-colorado-white-william
File name:App-Setup.exe
Download: download sample
Signature ConnectWise
File size:13'213'712 bytes
First seen:2025-12-17 11:50:21 UTC
Last seen:2025-12-17 18:41:01 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 573bb7b41bc641bd95c0f5eec13c233b (27 x GuLoader, 15 x VIPKeylogger, 11 x RemcosRAT)
ssdeep 393216:JM1RsO9yOac6Hom/an3JbQrTxSZB/tJ21+y0:Jqs6l6hi3JbYVSZHJ
Threatray 918 similar samples on MalwareBazaar
TLSH T197D6338DCDB0B7A8D060F4F944A67036F15A716719D737383129EA5D2CAC1C8CA53ABE
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10522/11/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter SquiblydooBlog
Tags:ConnectWise exe signed

Code Signing Certificate

Organisation:Taiyuan Tataomi Technology Co., Ltd.
Issuer:Sectigo Public Code Signing CA EV R36
Algorithm:sha256WithRSAEncryption
Valid from:2025-08-22T00:00:00Z
Valid to:2026-08-22T23:59:59Z
Serial number: 5886e0f4baa836e9231ba6f8f965e51d
Intelligence: 3 malware samples on MalwareBazaar are signed with this code signing certificate
Cert Graveyard Blocklist:This certificate is on the Cert Graveyard blocklist
Thumbprint Algorithm:SHA256
Thumbprint: d8196aea50466b06dbbef3012f050c2e59ab1d4c5c83414d1d1cd06196a1a3c4
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
107
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://invitationsinstaller.us/ready/
Verdict:
Malicious activity
Analysis date:
2025-12-08 14:01:25 UTC
Tags:
screenconnect rmm-tool remote tool telegram exfiltration stealer ims-api generic rat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
phishing stration shell spawn
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Launching a process
Creating a window
Сreating synchronization primitives
Modifying a system file
Sending a custom TCP request
Loading a suspicious library
Creating a file in the Windows subdirectories
Creating a file
Creating a file in the Program Files subdirectories
Creating a service
Launching a service
Creating a process from a recently created file
Searching for synchronization primitives
Creating a process with a hidden window
DNS request
Moving a file to the Windows subdirectory
Connection attempt
Using the Windows Management Instrumentation requests
Possible injection to a system process
Enabling autorun with the shell\open\command registry branches
Enabling autorun
Enabling autorun for a service
Unauthorized injection to a recently created process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-debug blackhole expand installer installer installer-heuristic lolbin microsoft_visual_cc nsis overlay rundll32 signed
Verdict:
Adware
File Type:
exe x32
First seen:
2025-11-16T03:58:00Z UTC
Last seen:
2025-12-18T10:34:00Z UTC
Hits:
~10
Detections:
BSS:Trojan.Win32.Generic.nblk BSS:Trojan.Win32.Generic not-a-virus:RemoteAdmin.MSIL.ConnectWise.d not-a-virus:RemoteAdmin.MSIL.ConnectWise.c not-a-virus:RemoteAdmin.MSIL.ConnectWise.b not-a-virus:RemoteAdmin.MSIL.ConnectWise.a not-a-virus:HEUR:RemoteAdmin.MSIL.ConnectWise.gen
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
.Net Executable Managed .NET NSIS Installer PDB Path PE (Portable Executable) PE File Layout SOS: 0.21 SOS: 0.24 SOS: 0.25 SOS: 0.26 SOS: 0.27 SOS: 0.31 SOS: 0.32 SOS: 0.36 SOS: 0.39 Win 32 Exe x86
Verdict:
Malicious
Threat:
RemoteAdmin.MSIL.ConnectWise
Threat name:
Win32.PUA.RAdminConnectWise
Status:
Malicious
First seen:
2025-11-14 23:36:38 UTC
File Type:
PE (Exe)
Extracted files:
177
AV detection:
12 of 36 (33.33%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
backdoor discovery execution persistence privilege_escalation ransomware rat revoked_codesign
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Executes dropped EXE
Loads dropped DLL
Boot or Logon Autostart Execution: Authentication Package
Drops file in System32 directory
Event Triggered Execution: Component Object Model Hijacking
Enumerates connected drives
ConnectWise ScreenConnect remote access tool
Badlisted process makes network request
Binary is signed using a ConnectWise certificate revoked for key compromise.
Command and Scripting Interpreter: PowerShell
Sets service image path in registry
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
ddfd45fd76607ba94debe6255019c8ceaaa1417ff3af3ca15cec029cc065750b
MD5 hash:
65c7d2acea10a28dd17bd57c64ee351a
SHA1 hash:
afaf246a910346cc0651edfad651e7af9811c313
SH256 hash:
986db3fc7426d1475b2048be9554fc6f4e4114050b3a43e1e980b5daeb6ec005
MD5 hash:
d9407a70b1727c420820cffbdc6e6082
SHA1 hash:
ba8ce5aef380edc29780ca2226193df26e6bfac4
SH256 hash:
b121689861b506dbc9c3797b49bc8a90d555cb7db58cb959165cc758391c00bb
MD5 hash:
8fe362ffdfa66269b8a64e3a87f68e52
SHA1 hash:
b5daaa60a6b8591a670da9fc3a2d6f896d55f568
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Detect_NSIS_Nullsoft_Installer
Author:Obscurity Labs LLC
Description:Detects NSIS installers by .ndata section + NSIS header string
Rule name:PE_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments