MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e56f39d14f0f68ddebbfa81d0ee8b579918ef2bae12ae916c373a5ab27485797. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 6 File information Comments

SHA256 hash: e56f39d14f0f68ddebbfa81d0ee8b579918ef2bae12ae916c373a5ab27485797
SHA3-384 hash: 17364d60883f1091f1a96dba4480829d8726660ec15d179979e466940932e6e7f1f0261e6afaff20a3f7a7027713cc5f
SHA1 hash: 8d048e0f0859ac42296177de0da6be2f5973b44a
MD5 hash: eae3cac4b39d4a4c41e7ca1f0cf0c9e9
humanhash: nebraska-snake-india-bakerloo
File name:e56f39d14f0f68ddebbfa81d0ee8b579918ef2bae12ae916c373a5ab27485797
Download: download sample
File size:221'696 bytes
First seen:2026-03-16 19:26:29 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 88782d69dc039f6c55bccd88c114f35f
ssdeep 3072:5FoYyQjQpTJVKp5fSb0pR/grZXEKKdeFazpvhqlMFsR+oTMa5AN5s:Stp3OfSITSZUKKdeFchsWNjM
TLSH T1F1247B027786C073D9670134451AD7766A7BF4780B398AC7F7DC0A7A4F266C29E3638A
TrID 52.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
10.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.8% (.EXE) Win64 Executable (generic) (6522/11/2)
8.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.5% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter JAMESWT_WT
Tags:185-246-223-71 94-156-170-255 dll

Intelligence


File Origin
# of uploads :
1
# of downloads :
207
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
81.4%
Tags:
injection virus
Result
Verdict:
Clean
Maliciousness:
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
adaptive-context anti-vm base64 evasive fingerprint microsoft_visual_cc
Verdict:
Malicious
Labled as:
VHO_Trojan_Win32_Convagent_gen
Malware family:
WS_Log Dynamic Link Library
Verdict:
Unknown
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 32 Exe x86
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Unpacked files
SH256 hash:
e56f39d14f0f68ddebbfa81d0ee8b579918ef2bae12ae916c373a5ab27485797
MD5 hash:
eae3cac4b39d4a4c41e7ca1f0cf0c9e9
SHA1 hash:
8d048e0f0859ac42296177de0da6be2f5973b44a
Detections:
win_samsam_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:telebot_framework
Author:vietdx.mb
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.
Rule name:win_samsam_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments