MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ead6b1f0add059261ac56e9453131184bc0ae2869f983b6a41a1abb167edf151. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



HijackLoader


Vendor detections: 12


Intelligence 12 IOCs YARA 3 File information Comments

SHA256 hash: ead6b1f0add059261ac56e9453131184bc0ae2869f983b6a41a1abb167edf151
SHA3-384 hash: 028a7710b20752ab81dcb42ce98497cbb0d9e76cacb29e7ef494a7b1989fb75797a4c28f01a8388ea20bdb7f92964928
SHA1 hash: c892e29d9be9ef00d1374e131437e6ce9861a794
MD5 hash: a0f4dd0e9ac7e37fe5b7e3e01f3752a1
humanhash: magazine-virginia-mars-spaghetti
File name:LPBNZSLE.msi
Download: download sample
Signature HijackLoader
File size:6'008'832 bytes
First seen:2025-09-16 19:19:28 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 98304:YgKIrU8e5ld+swHjyvJIgu1E13zzmSRwdKlXedlPEIAeUvhFFKHlKDx234I3Y8V:YflaxHjyhIM1haeMJaxfMFIEoBa
Threatray 16 similar samples on MalwareBazaar
TLSH T185563306FC87CB73CDBC5A323972A5A6404CAC14EB5355BE2435B583B5FA3CAD074A62
TrID 88.4% (.MST) Windows SDK Setup Transform script (61000/1/5)
11.5% (.) Generic OLE2 / Multistream Compound (8000/1)
Magika msi
Reporter aachum
Tags:ClickFix DeerStealer FakeCaptcha HIjackLoader msi


Avatar
iamaachum
http://80.253.249.186:5504/LPBNZSLE.msi

Intelligence


File Origin
# of uploads :
1
# of downloads :
297
Origin country :
ES ES
Vendor Threat Intelligence
Verdict:
Malicious
Score:
81.4%
Tags:
spawn hype sage
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
installer wix
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
File Type:
msi
First seen:
2025-09-16T14:27:00Z UTC
Last seen:
2025-09-16T14:27:00Z UTC
Hits:
~10
Result
Threat name:
HijackLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Creates a thread in another existing process (thread injection)
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Writes to foreign memory regions
Yara detected HijackLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1778794 Sample: LPBNZSLE.msi Startdate: 16/09/2025 Architecture: WINDOWS Score: 100 105 maenadkiln.com 2->105 107 lemniscatekermis.com 2->107 109 bestsecuredwnld.pro 2->109 125 Suricata IDS alerts for network traffic 2->125 127 Found malware configuration 2->127 129 Malicious sample detected (through community Yara rule) 2->129 131 3 other signatures 2->131 11 msiexec.exe 162 74 2->11         started        14 Stat-H.exe 5 2->14         started        17 Stat-H.exe 5 2->17         started        19 2 other processes 2->19 signatures3 process4 file5 91 C:\Users\user\AppData\Local\...\mfc140u.dll, PE32 11->91 dropped 93 C:\Users\user\AppData\...\VCRUNTIME140.dll, PE32 11->93 dropped 95 C:\Users\user\AppData\Local\Temp\...\Up.dll, PE32 11->95 dropped 103 7 other malicious files 11->103 dropped 21 Sync-Station.exe 9 11->21         started        25 Stat-H.exe 8 11->25         started        97 C:\Users\user\AppData\Local\...\DAE7578.tmp, PE32+ 14->97 dropped 147 Modifies the context of a thread in another process (thread injection) 14->147 149 Maps a DLL or memory area into another process 14->149 27 FrameClus64.exe 14->27         started        29 XPFix.exe 14->29         started        99 C:\Users\user\AppData\Local\...\D9269FE.tmp, PE32+ 17->99 dropped 31 FrameClus64.exe 17->31         started        33 XPFix.exe 17->33         started        101 C:\Users\user\AppData\Local\...A7DB66.tmp, PE32+ 19->101 dropped 35 VirtualDi.exe 19->35         started        37 XPFix.exe 19->37         started        signatures6 process7 file8 63 C:\ProgramData\...\mfc140u.dll, PE32 21->63 dropped 65 C:\ProgramData\...\VCRUNTIME140.dll, PE32 21->65 dropped 67 C:\ProgramData\channelService_test\Up.dll, PE32 21->67 dropped 75 2 other files (1 malicious) 21->75 dropped 133 Switches to a custom stack to bypass stack traces 21->133 39 Sync-Station.exe 7 21->39         started        69 C:\ProgramData\validFm_3\libmp4v2.dll, PE32+ 25->69 dropped 71 C:\ProgramData\validFm_3\WS_Log.DLL, PE32+ 25->71 dropped 73 C:\ProgramData\validFm_3\WSMultiTagMgr.dll, PE32+ 25->73 dropped 77 2 other malicious files 25->77 dropped 135 Found direct / indirect Syscall (likely to bypass EDR) 25->135 43 Stat-H.exe 7 25->43         started        signatures9 process10 file11 79 C:\Users\user\AppData\Roaming\...\XPFix.exe, PE32 39->79 dropped 81 C:\Users\user\AppData\Local\...\DAA7401.tmp, PE32+ 39->81 dropped 83 C:\ProgramData\VirtualDi.exe, PE32+ 39->83 dropped 137 Modifies the context of a thread in another process (thread injection) 39->137 139 Found hidden mapped module (file has been removed from disk) 39->139 141 Maps a DLL or memory area into another process 39->141 143 Switches to a custom stack to bypass stack traces 39->143 45 VirtualDi.exe 39->45         started        49 XPFix.exe 39->49         started        85 C:\Users\user\AppData\Roaming\...\XPFix.exe, PE32 43->85 dropped 87 C:\Users\user\AppData\...\FrameClus64.exe, PE32+ 43->87 dropped 89 C:\Users\user\AppData\Local\...\C6FF2CB.tmp, PE32+ 43->89 dropped 145 Found direct / indirect Syscall (likely to bypass EDR) 43->145 51 FrameClus64.exe 2 2 43->51         started        53 XPFix.exe 1 43->53         started        signatures12 process13 dnsIp14 119 maenadkiln.com 172.67.206.203, 443, 49693, 49712 CLOUDFLARENETUS United States 45->119 151 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 45->151 153 Tries to harvest and steal browser information (history, passwords, etc) 45->153 155 Writes to foreign memory regions 45->155 161 3 other signatures 45->161 55 chrome.exe 45->55         started        121 lemniscatekermis.com 104.21.32.1, 49690, 80 CLOUDFLARENETUS United States 51->121 123 bestsecuredwnld.pro 172.67.195.171, 443, 49691 CLOUDFLARENETUS United States 51->123 157 Found direct / indirect Syscall (likely to bypass EDR) 51->157 58 msiexec.exe 3 51->58         started        159 Switches to a custom stack to bypass stack traces 53->159 signatures15 process16 dnsIp17 111 192.168.2.6, 138, 443, 49238 unknown unknown 55->111 60 chrome.exe 55->60         started        process18 dnsIp19 113 www3.l.google.com 142.250.188.238, 443, 49698, 49705 GOOGLEUS United States 60->113 115 www.google.com 142.250.217.132, 443, 49694, 49700 GOOGLEUS United States 60->115 117 5 other IPs or domains 60->117
Gathering data
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-09-16 19:28:36 UTC
File Type:
Binary (Archive)
Extracted files:
64
AV detection:
9 of 24 (37.50%)
Threat level:
  5/5
Result
Malware family:
hijackloader
Score:
  10/10
Tags:
family:deerstealer family:hijackloader loader persistence privilege_escalation ransomware stealer
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Event Triggered Execution: Installer Packages
Drops file in Windows directory
Executes dropped EXE
Loads dropped DLL
Suspicious use of SetThreadContext
Enumerates connected drives
DeerStealer
Deerstealer family
Detects DeerStealer
Detects HijackLoader (aka IDAT Loader)
HijackLoader
Hijackloader family
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Malware family:
IDATLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments