MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ee9295fa36e29808ff36beb55be328b68d82f267d2faa54db26e0bf86b78fa56. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 5 File information Comments

SHA256 hash: ee9295fa36e29808ff36beb55be328b68d82f267d2faa54db26e0bf86b78fa56
SHA3-384 hash: ec0e384310f6d924aea8e8ca689a01b9d1630bf4a4b8ce121dc7fd66d3ad81c5a969ba76500e53ae7b11716fb3fdf769
SHA1 hash: 041a2e52944e51d5ee1e115123961257ad255fd1
MD5 hash: 1263bb047f3a83fc6dc90aaf362b34d2
humanhash: grey-two-harry-mockingbird
File name:cnmpaui.dll
Download: download sample
File size:103'424 bytes
First seen:2025-09-04 08:01:07 UTC
Last seen:2025-09-04 08:01:37 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash b30d4021abe7bc754f90105bfd91830d
ssdeep 3072:d7P2tiIOek72xtCQ0WhY8FjudF+W1jYB:12RQ7Atjjsj
TLSH T1C6A36B81F2E1D471CBBE083D0C25C7BD4B3E7860DF109DAB67D406698F356C18E66A6A
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10522/11/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter smica83
Tags:cnmpaui d32tpl7xt7175h-cloudfront-net dll SecurityScan

Intelligence


File Origin
# of uploads :
2
# of downloads :
81
Origin country :
HU HU
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
ldc microsoft_visual_cc obfuscated
Verdict:
Malicious
Labled as:
Suspicious:Backdoor.Hupigon.emk.mfkn
Verdict:
Unknown
File Type:
dll x32
First seen:
2025-09-04T04:10:00Z UTC
Last seen:
2025-09-04T04:10:00Z UTC
Hits:
~10
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
52 / 100
Signature
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1770951 Sample: cnmpaui.dll Startdate: 04/09/2025 Architecture: WINDOWS Score: 52 20 Multi AV Scanner detection for submitted file 2->20 7 loaddll32.exe 1 2->7         started        process3 process4 9 rundll32.exe 7->9         started        12 cmd.exe 1 7->12         started        14 conhost.exe 7->14         started        16 rundll32.exe 7->16         started        signatures5 22 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 9->22 18 rundll32.exe 12->18         started        process6
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.Kepavll
Status:
Malicious
First seen:
2025-09-04 08:09:36 UTC
File Type:
PE (Dll)
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Unpacked files
SH256 hash:
ee9295fa36e29808ff36beb55be328b68d82f267d2faa54db26e0bf86b78fa56
MD5 hash:
1263bb047f3a83fc6dc90aaf362b34d2
SHA1 hash:
041a2e52944e51d5ee1e115123961257ad255fd1
SH256 hash:
f4758a8c59877ec938fb211f4896333cad97d7da514f95a85521dd56254a3cfe
MD5 hash:
d714021fd7a849c803df180937295a67
SHA1 hash:
ea16c1e2ff5dfd72b25c0c89a5d8d49d44aca234
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CAS_Malware_Hunting
Author:Michael Reinprecht
Description:DEMO CAS YARA Rules for sample2.exe
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments