MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ff6cf1ec90b5ee387d12dbd0d9f27d29fd8a72a306345076cffd29bb93c09f34. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: ff6cf1ec90b5ee387d12dbd0d9f27d29fd8a72a306345076cffd29bb93c09f34
SHA3-384 hash: 7f5c2b526ef46841f6efa0dcb8f6ea1045253b7f4511d96b48a2c60274cbe7182e9ce87c380fbe75f89fc23fa02580d4
SHA1 hash: e6491a0577b2db9bdcc39b23d4fe79c8691e06a3
MD5 hash: c2d55d6ec652c302a5661a04e1e241d4
humanhash: louisiana-bulldog-potato-hamper
File name:DaebecpLSetup.msi
Download: download sample
File size:36'368'384 bytes
First seen:2026-01-23 04:17:48 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 786432:nPjhFuLEvCCMM1F32b8P3H4v2yRjxZ7xKm9pU53ILcTbl7E8Q:NFuLWCNM1Zy5xjKm9puHl7rQ
TLSH T1F18733B6784D4BB8C1A984F078E57A9C1E087C637E53182BF21EF4E910B24B754B45EE
TrID 88.4% (.MST) Windows SDK Setup Transform script (61000/1/5)
11.5% (.) Generic OLE2 / Multistream Compound (8000/1)
Magika msi
Reporter zhuzhu0009
Tags:msi

Intelligence


File Origin
# of uploads :
1
# of downloads :
31
Origin country :
JP JP
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
File Type:
msi
First seen:
2026-01-23T01:57:00Z UTC
Last seen:
2026-01-23T09:59:00Z UTC
Hits:
~10
Detections:
Trojan.Win64.Shlem.sb Trojan.Win64.Shlem.rfz Trojan.Win64.Shelm.sb Trojan.Win32.Shelm.a HEUR:Trojan.OLE2.Cobalt.gen Trojan.PowerShell.Cobalt.sb HEUR:Trojan.Win32.Generic Trojan.Win64.Shlem.rgf
Gathering data
Threat name:
Win32.Trojan.Malgent
Status:
Malicious
First seen:
2026-01-22 16:02:24 UTC
File Type:
Binary (Archive)
Extracted files:
50
AV detection:
3 of 24 (12.50%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
donutloader
Similar samples:
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion discovery execution persistence privilege_escalation ransomware spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Command and Scripting Interpreter: PowerShell
Event Triggered Execution: Installer Packages
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Enumerates connected drives
Network Service Discovery
Drops startup file
Event Triggered Execution: Component Object Model Hijacking
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Malware family:
QuasarRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_tiny_vbs
Author:daniyyell
Description:Detects tiny VBS delivery technique

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments