MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fafc377d8160a8bb6546750daabd76a83af59a5b7ae3b7d84a90f5d9aa36a1e2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 4 File information Comments

SHA256 hash: fafc377d8160a8bb6546750daabd76a83af59a5b7ae3b7d84a90f5d9aa36a1e2
SHA3-384 hash: 456243a403a4b79e02ccd94aa7e3d64005f7b3cb147c80063d5d4732d203ce0ee439d79a444f5bb80e8226904bebc0f0
SHA1 hash: 2d82bac68a004642f64c2f2214fbe764e0be90af
MD5 hash: f5ae7306f6df3648d2f0001bd564c647
humanhash: sad-montana-wisconsin-cold
File name:Konto2.pdf.lnk
Download: download sample
File size:3'068 bytes
First seen:2025-08-15 15:34:43 UTC
Last seen:Never
File type:Shortcut (lnk) lnk
MIME type:application/x-ms-shortcut
ssdeep 24:8Ayw/BHYVKVWf+/CW5lyAZK3YbyZNgERAlgSXzAedd79dsrabxJlpl9l:8y5apAZKIU1KUedJ9AadrL9
TLSH T1CC51072C1AD61329E2B6D73598B66215E937B947F9308E4D00CE43481727616F494F2F
Magika lnk
Reporter abuse_ch
Tags:lnk

Intelligence


File Origin
# of uploads :
1
# of downloads :
31
Origin country :
SE SE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
92.5%
Tags:
obfuscate cryxos xtreme spawn
Result
Verdict:
Malicious
File Type:
LNK File - Malicious
Behaviour
BlacklistAPI detected
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
evasive masquerade
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
Creates processes via WMI
Downloads files with wrong headers with respect to MIME Content-Type
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Uses an obfuscated file name to hide its real file extension (double extension)
Windows shortcut file (LNK) starts blacklisted processes
Yara detected LNK With Padded Argument
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1758004 Sample: Konto2.pdf.lnk Startdate: 15/08/2025 Architecture: WINDOWS Score: 100 64 zephareos.pro 2->64 66 x1.i.lencr.org 2->66 68 3 other IPs or domains 2->68 78 Suricata IDS alerts for network traffic 2->78 80 Malicious sample detected (through community Yara rule) 2->80 82 Windows shortcut file (LNK) starts blacklisted processes 2->82 84 9 other signatures 2->84 11 Dev-Cobalt.exe 2->11         started        15 powershell.exe 89 2->15         started        17 Dev-Cobalt.exe 2->17         started        19 svchost.exe 2->19         started        signatures3 process4 dnsIp5 54 C:\Users\user\AppData\Roaming\...\Chime.exe, PE32 11->54 dropped 56 C:\Users\user\AppData\Local\...\ByteScop.exe, PE32+ 11->56 dropped 58 C:\Users\user\AppData\Local\...\AE01896.tmp, PE32+ 11->58 dropped 100 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 11->100 102 Modifies the context of a thread in another process (thread injection) 11->102 104 Found hidden mapped module (file has been removed from disk) 11->104 106 Switches to a custom stack to bypass stack traces 11->106 22 Chime.exe 11->22         started        25 ByteScop.exe 11->25         started        108 Windows shortcut file (LNK) starts blacklisted processes 15->108 110 Loading BitLocker PowerShell Module 15->110 28 mshta.exe 16 15->28         started        30 conhost.exe 1 15->30         started        60 C:\Users\user\AppData\Local\...\BC174B0.tmp, PE32+ 17->60 dropped 112 Maps a DLL or memory area into another process 17->112 32 ByteScop.exe 17->32         started        34 Chime.exe 17->34         started        70 127.0.0.1 unknown unknown 19->70 file6 signatures7 process8 dnsIp9 86 Switches to a custom stack to bypass stack traces 22->86 88 Found direct / indirect Syscall (likely to bypass EDR) 22->88 72 zephareos.pro 172.67.213.156, 49700, 49701, 49702 CLOUDFLARENETUS United States 25->72 74 195.133.88.102, 49681, 49686, 80 ETOP-ASPL Russian Federation 28->74 90 Encrypted powershell cmdline option found 28->90 92 Creates processes via WMI 28->92 36 powershell.exe 17 21 28->36         started        signatures10 process11 process12 38 Dev-Cobalt.exe 36->38         started        42 Acrobat.exe 36->42         started        44 conhost.exe 36->44         started        file13 52 C:\Users\user\AppData\Local\...\BC475BA.tmp, PE32+ 38->52 dropped 94 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 38->94 96 Modifies the context of a thread in another process (thread injection) 38->96 98 Maps a DLL or memory area into another process 38->98 46 AcroCEF.exe 42->46         started        signatures14 process15 dnsIp16 76 e8652.dscx.akamaiedge.net 23.39.37.95, 49697, 80 AKAMAI-ASUS United States 46->76 49 AcroCEF.exe 46->49         started        process17 dnsIp18 62 23.41.168.139, 443, 49696 ZAYO-6461US United States 49->62
Gathering data
Threat name:
Shortcut.Trojan.Hijackloader
Status:
Malicious
First seen:
2025-08-14 21:23:31 UTC
File Type:
Binary
AV detection:
11 of 38 (28.95%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
defense_evasion execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Command and Scripting Interpreter: PowerShell
Checks computer location settings
Blocklisted process makes network request
Modifies trusted root certificate store through registry
Malware Config
Dropper Extraction:
http://195.133.88.102:80/PuHjd3S1lk/Konten2.mp4
Malware family:
GHOSTPULSE
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:EXT_EXPL_ZTH_LNK_EXPLOIT_A
Author:Peter Girnus
Description:This YARA file detects padded LNK files designed to exploit ZDI-CAN-25373.
Reference:https://www.trendmicro.com/en_us/research/25/c/windows-shortcut-zero-day-exploit.html
Rule name:PS_in_LNK
Author:@bartblaze
Description:Identifies PowerShell artefacts in shortcut (LNK) files.
Rule name:SUSP_LNK_PowerShell
Author:SECUINFRA Falcon Team
Description:Detects the reference to powershell inside an lnk file, which is suspicious
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Shortcut (lnk) lnk fafc377d8160a8bb6546750daabd76a83af59a5b7ae3b7d84a90f5d9aa36a1e2

(this sample)

  
Delivery method
Distributed via web download

Comments