MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e25fa1d0a29eaea8b9a60a2d39c73f147efd544d391a4a4e115df13534226481. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 3 File information Comments

SHA256 hash: e25fa1d0a29eaea8b9a60a2d39c73f147efd544d391a4a4e115df13534226481
SHA3-384 hash: dfd430ef502aee924925d3d68578329a7005632cbd7cd6e6a48056133ef6efd4622611f6b7f0b72065461472aa4a8ad7
SHA1 hash: aef32996eb0eeb15c7698103cedd2f5c1537f008
MD5 hash: 254c519f7e22846df3cb2a4c90be9340
humanhash: winner-victor-rugby-lithium
File name:Dienstangebot_E_Alanli_23-03-26.exe
Download: download sample
File size:95'200 bytes
First seen:2026-03-30 23:19:25 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4a6e8d420f7acd5d98f7bfb61b4ca87b
ssdeep 1536:v6PoP1qYrQxE7nGc7PwiCJGuPDtAQ/q6RAw5/8xUIUWJfOPfVl7io+oY894ffIL1:T50ZaPwiCJztBhv5/Wjt69NpzZr
TLSH T10993E17291A8C79EDA7FD67076E8D7527D367FE28A70818E2C8412E50F21363976C423
TrID 33.1% (.EXE) Win64 Executable (generic) (6522/11/2)
25.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.4% (.ICL) Windows Icons Library (generic) (2059/9)
10.3% (.EXE) OS/2 Executable (generic) (2029/13)
10.1% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
dhash icon 236141d595193163
Reporter SquiblydooBlog
Tags:exe signed

Code Signing Certificate

Organisation:Robert Walters
Issuer:Microsoft ID Verified CS EOC CA 01
Algorithm:sha384WithRSAEncryption
Valid from:2026-03-30T11:11:58Z
Valid to:2026-04-02T11:11:58Z
Serial number: 330007bae25f25abaad971133b00000007bae2
Cert Graveyard Blocklist:This certificate is on the Cert Graveyard blocklist
Thumbprint Algorithm:SHA256
Thumbprint: 5d59a1e6d052258543313b3fad35faa1590a345282b70c09f6fa1310da80432f
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
120
Origin country :
US US
Vendor Threat Intelligence
Gathering data
Malware family:
n/a
ID:
1
File name:
Dienstangebot_E_Alanli_23-03-26.exe
Verdict:
No threats detected
Analysis date:
2026-03-30 23:21:28 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
injection obfusc crypt
Result
Verdict:
Clean
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug microsoft_visual_cc packed short-lived-cert signed
Verdict:
Malicious
File Type:
exe x64
First seen:
2026-04-01T08:00:00Z UTC
Last seen:
2026-04-01T15:53:00Z UTC
Hits:
~10
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 64 Exe x64
Result
Malware family:
n/a
Score:
  5/10
Tags:
persistence privilege_escalation
Behaviour
Modifies registry class
Event Triggered Execution: Component Object Model Hijacking
Unpacked files
SH256 hash:
e25fa1d0a29eaea8b9a60a2d39c73f147efd544d391a4a4e115df13534226481
MD5 hash:
254c519f7e22846df3cb2a4c90be9340
SHA1 hash:
aef32996eb0eeb15c7698103cedd2f5c1537f008
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_OutputDebugStringA_iat
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments