MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e6aab1b6a150ee3cbc721ac2575c57309f307f69cd1b478d494c25cde0baaf85. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CastleLoader


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: e6aab1b6a150ee3cbc721ac2575c57309f307f69cd1b478d494c25cde0baaf85
SHA3-384 hash: 50eea0253a8b05f08c42d04c9bb33b09a86f53a681b4874b185c1ed6daa17e676ac999f328144a792bd40384e63957d3
SHA1 hash: 1f88e8ac20f26775ab639cacaed3bb5344cd9a2b
MD5 hash: 5b8a5f2e30c507a532e13aa1955714ef
humanhash: item-lion-orange-nitrogen
File name:e6aab1b6a150ee3cbc721ac2575c57309f307f69cd1b478d494c25cde0baaf85
Download: download sample
Signature CastleLoader
File size:95'132'820 bytes
First seen:2025-11-05 09:49:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 81073f2b397217228357dd031a037bb5 (2 x CastleLoader)
ssdeep 393216:Slg0RgcdW48wApekwgTeD26OLp0iS69bKISga5ddIORieiFuNSG7vg6:SlKW8HpFLXBdanBRi
Threatray 2 similar samples on MalwareBazaar
TLSH T112283327F264D03DC06A173245B6E6A08A3B7E20DD064D4F17EC798DEF729A10E3BA55
TrID 38.1% (.EXE) InstallShield setup (43053/19/16)
36.8% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
9.3% (.EXE) Win64 Executable (generic) (10522/11/4)
4.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
3.9% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter JAMESWT_WT
Tags:CastleLoader exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
441
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e6aab1b6a150ee3cbc721ac2575c57309f307f69cd1b478d494c25cde0baaf85
Verdict:
Suspicious activity
Analysis date:
2025-11-05 10:22:24 UTC
Tags:
themida vmprotect inno installer delphi

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
95.7%
Tags:
cobalt virus bckdr hype
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Connecting to a non-recommended domain
Connection attempt
Sending an HTTP GET request
DNS request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context anti-debug bloated corrupted expand expired-cert fingerprint installer-heuristic lolbin microsoft_visual_cc obfuscated overlay overlay packed packed packed pnputil securom themidawinlicense timeout
Verdict:
Malicious
Labled as:
Win64/Agent_AGeneric.FOS trojan
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-11-05T08:27:00Z UTC
Last seen:
2025-11-05T11:29:00Z UTC
Hits:
~10
Gathering data
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-07-11 07:55:30 UTC
AV detection:
18 of 36 (50.00%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
castleloader
Result
Malware family:
castlebot
Score:
  10/10
Tags:
family:castlebot actor:tag_150 apt discovery themida trojan vmprotect
Behaviour
System Location Discovery: System Language Discovery
Themida packer
VMProtect packed file
CaslteBOT
Castlebot family
Detects CastleBOT payload
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments