MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e4258bdfa82a1065aa1095ae2c6da4240f6ebe20ba285e56f1e216eec5984510. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gamaredon


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: e4258bdfa82a1065aa1095ae2c6da4240f6ebe20ba285e56f1e216eec5984510
SHA3-384 hash: 6b7356505e753e085f2ac57e110289dfef635becd42cb071cc750e5a7c4df7f9ea356035a36df3330ff4627ad7740f1e
SHA1 hash: df06666f061e4b318c807bcdb7464e510f028237
MD5 hash: 4e6f239440ee9f18b1361c6776966ec9
humanhash: illinois-equal-ink-twenty
File name:2-1180-25_24.06.2025.HTA
Download: download sample
Signature Gamaredon
File size:3'636 bytes
First seen:2025-06-28 14:39:43 UTC
Last seen:Never
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 48:tRuqxAqw34BR7nismC/dZmo9MYEUS3L+vXl7l4c9EI6k+hirf/FC7:bfAFSRaC/dZmoyslGOv4
TLSH T15771862A5F0D08A0030A93DE9676674CFFD004A7EBF6D530F454252EECB2668D75B17A
Magika vba
Reporter abuse_ch
Tags:gamaredon hta

Intelligence


File Origin
# of uploads :
1
# of downloads :
67
Origin country :
SE SE
Vendor Threat Intelligence
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Payload URLs
URL
File name
https://nylonjEd.com
HTA File
Behaviour
BlacklistAPI detected
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj
Score:
52 / 100
Signature
Multi AV Scanner detection for submitted file
Uses dynamic DNS services
Behaviour
Behavior Graph:
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
Html
Threat name:
Win32.Trojan.Egairtigado
Status:
Malicious
First seen:
2025-06-24 09:41:06 UTC
File Type:
Text (HTML)
Extracted files:
1
AV detection:
9 of 24 (37.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Checks computer location settings
Blocklisted process makes network request
Malware Config
Dropper Extraction:
http://google.com@document-downloads.ddns.net/OD/sensationaSL/AprilcWs.jpeg
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments