MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e641ad9ed0382b31da3394af06142473157470046f044dbb1ff3d1168088ff89. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
ConnectWise
Vendor detections: 15
| SHA256 hash: | e641ad9ed0382b31da3394af06142473157470046f044dbb1ff3d1168088ff89 |
|---|---|
| SHA3-384 hash: | 990e62af3347d007e456bc09ddefbefc8f571b4d07123cd61a62fcbe52621868757704940bf0b0f6aefaedbcf2eca606 |
| SHA1 hash: | 1802dbc79fe1699924fd8b8acbc465d8b3a9a190 |
| MD5 hash: | 39a44c13ae04802bd6a5eb3aa1a63acc |
| humanhash: | iowa-nebraska-mexico-golf |
| File name: | ScreenConnect.ClientSetup2.exe |
| Download: | download sample |
| Signature | ConnectWise |
| File size: | 12'637'240 bytes |
| First seen: | 2026-03-18 15:11:06 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 9771ee6344923fa220489ab01239bdfd (271 x ConnectWise) |
| ssdeep | 196608:CfefPiBn2hg5kEWmXhcfKjSV4h7vGelBn2hg5kEWmXhcfKjSVJBn2hg5kEWmXhc/:mgdEEijRDGKgdEEijsgdEEijkgdEEijF |
| Threatray | 1'844 similar samples on MalwareBazaar |
| TLSH | T1D7D61201B3E69574D0BB0A38D87A9266AA31BD005716C7BF5794B92D2D33BC08E32777 |
| TrID | 29.5% (.EXE) Win64 Executable (generic) (6522/11/2) 22.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 20.3% (.EXE) Win32 Executable (generic) (4504/4/1) 9.1% (.EXE) OS/2 Executable (generic) (2029/13) 9.0% (.EXE) Generic Win/DOS Executable (2002/3) |
| Magika | pebin |
| Reporter | Anonymous |
| Tags: | ConnectWise exe signed |
Code Signing Certificate
| Organisation: | ConnectWise, LLC |
|---|---|
| Issuer: | DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 |
| Algorithm: | sha256WithRSAEncryption |
| Valid from: | 2026-02-20T00:00:00Z |
| Valid to: | 2027-02-19T23:59:59Z |
| Serial number: | 01dddbc6e9163d407d980a3eaf798528 |
| Intelligence: | 24 malware samples on MalwareBazaar are signed with this code signing certificate |
| Thumbprint Algorithm: | SHA256 |
| Thumbprint: | e1db8670d34a3d8099b9815c9772b37025a7b5d1845ec5256eb22dad7e196725 |
| Source: | This information was brought to you by ReversingLabs A1000 Malware Analysis Platform |
Intelligence
File Origin
USVendor Threat Intelligence
Details
Result
Behaviour
Result
Result
Behaviour
Unpacked files
f17fca4728918de6ead811c3df5ca791400ce8988dc6a8d3e7aabd52abbaf89b
ff93759e80f3c471fa164b1d228d6f40d6632546d3fbe96e9bfe75ba591d92db
329b604591e3f504e932fed0f75dcada34cdc748c69d09c1e85dd420609173ad
503d5d51fab6944c2c18cc81c3aa7b5c0d21bc5df417a13894630b41c05fb71a
e641ad9ed0382b31da3394af06142473157470046f044dbb1ff3d1168088ff89
f17fca4728918de6ead811c3df5ca791400ce8988dc6a8d3e7aabd52abbaf89b
ff93759e80f3c471fa164b1d228d6f40d6632546d3fbe96e9bfe75ba591d92db
329b604591e3f504e932fed0f75dcada34cdc748c69d09c1e85dd420609173ad
503d5d51fab6944c2c18cc81c3aa7b5c0d21bc5df417a13894630b41c05fb71a
e641ad9ed0382b31da3394af06142473157470046f044dbb1ff3d1168088ff89
f17fca4728918de6ead811c3df5ca791400ce8988dc6a8d3e7aabd52abbaf89b
ff93759e80f3c471fa164b1d228d6f40d6632546d3fbe96e9bfe75ba591d92db
329b604591e3f504e932fed0f75dcada34cdc748c69d09c1e85dd420609173ad
503d5d51fab6944c2c18cc81c3aa7b5c0d21bc5df417a13894630b41c05fb71a
e641ad9ed0382b31da3394af06142473157470046f044dbb1ff3d1168088ff89
f17fca4728918de6ead811c3df5ca791400ce8988dc6a8d3e7aabd52abbaf89b
ff93759e80f3c471fa164b1d228d6f40d6632546d3fbe96e9bfe75ba591d92db
329b604591e3f504e932fed0f75dcada34cdc748c69d09c1e85dd420609173ad
503d5d51fab6944c2c18cc81c3aa7b5c0d21bc5df417a13894630b41c05fb71a
e641ad9ed0382b31da3394af06142473157470046f044dbb1ff3d1168088ff89
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_beacon_detected |
|---|---|
| Author: | 0x0d4y |
| Description: | This rule detects cobalt strike beacons. |
| Rule name: | CP_Script_Inject_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | Detects attempts to inject code into another process across PE, ELF, Mach-O binaries |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | INDICATOR_EXE_DotNET_Encrypted |
|---|---|
| Author: | ditekSHen |
| Description: | Detects encrypted or obfuscated .NET executables |
| Rule name: | INDICATOR_RMM_ConnectWise_ScreenConnect |
|---|---|
| Author: | ditekSHen |
| Description: | Detects ConnectWise Control (formerly ScreenConnect). Review RMM Inventory |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | telebot_framework |
|---|---|
| Author: | vietdx.mb |
| Rule name: | TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE |
|---|---|
| Author: | CYFARE |
| Description: | Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments |
| Reference: | https://cyfare.net/ |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.