MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 eed5f9d02a1ac26d2b52bc1e4bafa73073faed0bb665687ddcf90dcecb41b878. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 12


Intelligence 12 IOCs YARA 5 File information Comments

SHA256 hash: eed5f9d02a1ac26d2b52bc1e4bafa73073faed0bb665687ddcf90dcecb41b878
SHA3-384 hash: f0c9619fe6644357e16ac9aa83d3149b053e1e0a9b1eb01d9019ebd8b3151271c7bd071c536f2c5152c99e43dd816ee3
SHA1 hash: 8fe5b0f1b8e5146d37889676941d57e4563427df
MD5 hash: 6a87453a7f6b63b947f36fb0552c1870
humanhash: mississippi-oscar-oven-paris
File name:UPZDKGAF.bin
Download: download sample
File size:11'723'681 bytes
First seen:2025-07-16 07:16:21 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 657e40fb09b2c5e277b865a7cf2b8089 (6 x AsyncRAT, 4 x Arechclient2, 3 x DanaBot)
ssdeep 196608:0laSuYqPXhyy/uFjmONZvdEtiWcSt8eKH8AG3uxCSknGwtDki/cZNNnMJrTHeo29:iaSuYqJv/yB9dEBx7+YGwtb0L6tTHeoW
TLSH T119C623326156303BF6F539F3E815D1303D69A2185B58C8BEC6C0AC5D3DA89DA6AF7306
TrID 40.3% (.EXE) Win64 Executable (generic) (10522/11/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4504/4/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
dhash icon b2e1b496a6cada72 (13 x LummaStealer, 12 x AsyncRAT, 8 x Rhadamanthys)
Reporter abuse_ch
Tags:bin exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
26
Origin country :
SE SE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
UPZDKGAF.bin
Verdict:
Malicious activity
Analysis date:
2025-07-16 07:18:19 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
93.3%
Tags:
shellcode dropper
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a file in the Windows subdirectories
Creating a process from a recently created file
Creating a window
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context crypto expand expired-cert fingerprint installer invalid-signature lolbin masquerade microsoft_visual_cc overlay overlay runonce signed
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
64 / 100
Signature
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to detect sandboxes / dynamic malware analysis system (Installed program check)
Behaviour
Behavior Graph:
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
.Net CAB:COMPRESSION:LZX Executable PDB Path PE (Portable Executable) Win 32 Exe x86
Threat name:
Win32.Trojan.Rugmi
Status:
Malicious
First seen:
2025-07-15 15:41:16 UTC
File Type:
PE (Exe)
Extracted files:
30
AV detection:
9 of 38 (23.68%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Unpacked files
SH256 hash:
2e88436efd6d5ffab85709fd8b25873cf2739201cd4148c1c515559c38cd785b
MD5 hash:
0985a1b78f15f5e36ad3f5b00c719228
SHA1 hash:
b6e43450df9c3a4274eeb66f64398c067312a7ac
SH256 hash:
5063c17f2b01a17119fbbdd64338368bd9169f832abe719bfbd2b4e65fb599d4
MD5 hash:
b16a09fc1d6ff8cb36aeeecc3d1189d1
SHA1 hash:
5988d71c87e1157166569ee676a92ed528c22502
SH256 hash:
5ce76909fd18463f9df97a1c01aaa71b7a5985fd30a42856e59965b2369d371c
MD5 hash:
e4c584c13c9684c4741a0c9ce36fd2ce
SHA1 hash:
6e8bf5d5dcd54f1f0d8944cd928c46c3b5a720cc
SH256 hash:
666f1732fefff0356c92250ef38bfdc5c309cbec30d8400273f5af10dbd08431
MD5 hash:
1cc223b2dacb331ab9a8603affb02994
SHA1 hash:
a4483997dc82f2d942b9cba57019d837cf817fff
SH256 hash:
6ccbd84715baf2f6eb7ec9141e488011722f613c40e2bdbd431447523e10d642
MD5 hash:
aa5f2e5a6dd62c61cc10160db86e222d
SHA1 hash:
4d27782620cc6a32ea60674ba33a004df82cf388
SH256 hash:
81b425428d0d77672d1bb316cf6d80689ff9bfc43eafad56163f623ceecc94e4
MD5 hash:
f437ddd80e9124d49b01d24a3e4f8858
SHA1 hash:
97d637335cd474b7f4bcc461561d12f40ec6fe4f
SH256 hash:
bea8c675642cfef9c7e9eb77498c06082487a1ef436ea44768c7d396f054b923
MD5 hash:
a734a5e299ca76dd458300deb551a229
SHA1 hash:
58b4e344b11e549286036a25da3240594440795f
SH256 hash:
d10560f3a3fc232ef6b40c65d4933bd0878e27bd5564ca49025976f78e63a6eb
MD5 hash:
0d8c959a7ac1be81415671921d9b0035
SHA1 hash:
71f8e1837332849d55b53c4566b1b7e4afa38226
SH256 hash:
d8afc64b1ba70bd665f14d6a39cd2bc5c41ff2dee03cf76c2f0126db10fdfa4d
MD5 hash:
5a7b2dd2357aa3135e9361e0c18c6a92
SHA1 hash:
351576cf3a0c230cf436490c0ef11f5a347b8f86
SH256 hash:
eed5f9d02a1ac26d2b52bc1e4bafa73073faed0bb665687ddcf90dcecb41b878
MD5 hash:
6a87453a7f6b63b947f36fb0552c1870
SHA1 hash:
8fe5b0f1b8e5146d37889676941d57e4563427df
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe eed5f9d02a1ac26d2b52bc1e4bafa73073faed0bb665687ddcf90dcecb41b878

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::AllocateAndInitializeSid
ADVAPI32.dll::ConvertStringSecurityDescriptorToSecurityDescriptorW
ADVAPI32.dll::CreateWellKnownSid
ADVAPI32.dll::SetEntriesInAclW
ADVAPI32.dll::SetEntriesInAclA
ADVAPI32.dll::SetNamedSecurityInfoW
COM_BASE_APICan Download & Execute componentsole32.dll::CLSIDFromProgID
ole32.dll::CoCreateInstance
ole32.dll::CoInitializeSecurity
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::CheckTokenMembership
ADVAPI32.dll::GetTokenInformation
ADVAPI32.dll::IsWellKnownSid
ADVAPI32.dll::SetSecurityDescriptorDacl
ADVAPI32.dll::SetSecurityDescriptorGroup
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteExW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
KERNEL32.dll::OpenProcess
ADVAPI32.dll::OpenProcessToken
KERNEL32.dll::SetProcessShutdownParameters
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineA
KERNEL32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleOutputCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileW
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileMappingW
KERNEL32.dll::CreateFileA
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
WIN_BASE_USER_APIRetrieves Account InformationKERNEL32.dll::GetComputerNameW
ADVAPI32.dll::GetUserNameW
ADVAPI32.dll::LookupPrivilegeValueW
WIN_BCRYPT_APICan Encrypt FilesADVAPI32.dll::DecryptFileW
WIN_CRYPT_APIUses Windows Crypt APIADVAPI32.dll::CryptAcquireContextW
ADVAPI32.dll::CryptCreateHash
ADVAPI32.dll::CryptGetHashParam
ADVAPI32.dll::CryptHashData
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryInfoKeyW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
WIN_SVC_APICan Manipulate Windows ServicesADVAPI32.dll::ChangeServiceConfigW
ADVAPI32.dll::ControlService
ADVAPI32.dll::OpenSCManagerW
ADVAPI32.dll::OpenServiceW
ADVAPI32.dll::QueryServiceConfigW
ADVAPI32.dll::QueryServiceStatus
WIN_USER_APIPerforms GUI ActionsUSER32.dll::CreateWindowExW

Comments