MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f388bdf766861f191fedc892b59267523b5d2e2fd2b43f70e9d0ef74c660fc61. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 5 File information Comments

SHA256 hash: f388bdf766861f191fedc892b59267523b5d2e2fd2b43f70e9d0ef74c660fc61
SHA3-384 hash: 77c560b92ef0812b3312072ea20941a294c6f601ba16886a79e9e5a2a491b5348d91855dfa9856a2e4a2d5b49cc94609
SHA1 hash: b154bdd44ea7a847bbb36d296916f0ea7a3127ce
MD5 hash: 96f7512c4d7b7bdb14e893549774c6ab
humanhash: sweet-robert-foxtrot-network
File name:buildshellcode.exe
Download: download sample
File size:222'720 bytes
First seen:2026-01-08 16:12:42 UTC
Last seen:2026-01-09 03:24:56 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e3477015650bcfd88094f3f2380a2604
ssdeep 3072:NIM6x9z4jhVhcHjy/9MQwenr9klGxUx9Wgoe5w0SOuqJE6PtUsH5NNYO:jhjcHjy/9MCnr9kAx/kTSiRYO
TLSH T144246D5673A408F8E5B78279CC514609E6B2BC564760EBCF03A0476BDF232E19D3EB61
TrID 48.7% (.EXE) Win64 Executable (generic) (10522/11/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter BlinkzSec
Tags:exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
131
Origin country :
CZ CZ
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
buildshellcode.exe
Verdict:
No threats detected
Analysis date:
2026-01-08 16:13:14 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
DNS request
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
anti-vm fingerprint microsoft_visual_cc
Verdict:
Clean
File Type:
exe x64
First seen:
2025-05-11T14:32:00Z UTC
Last seen:
2026-01-08T14:25:00Z UTC
Hits:
~10
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2026-01-05 09:33:46 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
6 of 24 (25.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
f388bdf766861f191fedc892b59267523b5d2e2fd2b43f70e9d0ef74c660fc61
MD5 hash:
96f7512c4d7b7bdb14e893549774c6ab
SHA1 hash:
b154bdd44ea7a847bbb36d296916f0ea7a3127ce
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe f388bdf766861f191fedc892b59267523b5d2e2fd2b43f70e9d0ef74c660fc61

(this sample)

  
Delivery method
Distributed via web download

Comments