DEV Community

THREAT CHAIN
THREAT CHAIN

Posted on • Originally published at threatchain.io

ConnectWise Sample Detected: ScreenConnect.ClientSetup.exe

CORRECTION (2026-04-23): An earlier version of this post framed ConnectWise as a "malware family." That was incorrect. ConnectWise ScreenConnect is a legitimate Remote Monitoring and Management (RMM) product used by MSPs and IT teams. The threat we track is the abusive deployment of ScreenConnect (and similar RMM tools — AnyDesk, TeamViewer, Atera, Splashtop) by tech-support scammers, initial-access brokers, and ransomware affiliates. The correct category is RMM abuse / living-off-trusted-software. The IOCs below are for the specific observed sample, not an indictment of the product. The canonical version of this post with full rewrites is at https://threatchain.io/connectwise-sample-detected-screenconnect-clientsetup-exe-66ca66ca.


This article was originally published on ThreatChain — decentralized threat intelligence.

Your security tools might have missed this one. ConnectWise is actively targeting networks right now — here's what you need to know before it hits yours.

A new ConnectWise sample was identified by threat intelligence feeds on 2026-04-22 17:51:30. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.

The Sample at a Glance

Field Value
SHA-256 66ca66cae93c34e60a9a328b082fc7aa5396cc046bcfc5a14681d072128b9be7
File name ScreenConnect.ClientSetup.exe
File type exe
Size 12.17 MB
Origin (first observed) US
First seen 2026-04-22 17:51:30
Family ConnectWise
Tags ConnectWise, exe, signed
VirusTotal detection 16/76 engines flagged malicious

What ConnectWise Does

ConnectWise is a malware family observed delivering malicious payloads to Windows systems. Samples in this family typically steal credentials, establish persistence, or enable remote access for attackers.

Seeing this family on your network — or finding a file matching this hash — is a red flag. ConnectWise samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.

Detection Landscape

Multiple security vendors have weighed in on this specific sample:

  • ANY.RUN: [{'malware_family': None, 'verdict': 'No threats detected', 'file_name': 'https://vallparty.de/winedine.html', 'date': '2026-04-21 17:27:42', 'analysis_url': 'https://app.any.run/tasks/48201bd7-83fb-49ad-8419-d86b8e57c437', 'tags': []}]
  • vxCube: malware2
  • Intezer: suspicious
  • Spamhaus_HBL: [{'detection': 'malicious', 'link': 'https://www.spamhaus.org/hbl/'}]
  • UnpacMe: [{'sha256_hash': '66ca66cae93c34e60a9a328b082fc7aa5396cc046bcfc5a14681d072128b9be7', 'md5_hash': '13931e8f741f06b43d1438ee6383582c', 'sha1_hash': 'ad9197195b81e27229685ce637ba23115c1292c6', 'detections': [], 'link': 'https://www.unpac.me/results/3371a718-17c6-4ee7-8fad-8e3b68ebdb19/'}, {'sha256_hash': '8a55c15cc76e31042e17458c479772aa95bc1b908016c85b1dc8b8e3eff23254', 'md5_hash': 'decb1fd20d75e6eade9289cc24605f29', 'sha1_hash': '5169602d641c4f2ebd9ca0639622949e00c25566', 'detections': [], 'link': 'https://www.unpac.me/results/3371a718-17c6-4ee7-8fad-8e3b68ebdb19/'}, {'sha256_hash': '0e6502db9fcae756f42f1e32cbb70b87b54286cc9ea1b7a83f51f57b10975aad', 'md5_hash': '222611c5a579a6e22a3333dcd3587aba', 'sha1_hash': 'a1cc8b62acbb217146525a20f26e9ef4241e8563', 'detections': [], 'link': 'https://www.unpac.me/results/3371a718-17c6-4ee7-8fad-8e3b68ebdb19/'}, {'sha256_hash': '28ff8468ad2db8b41fe9d9a2971dd56fea0aecad14808fe4b31c9b1072d3b129', 'md5_hash': '62d114c95b604d7ca684759c22c4c688', 'sha1_hash': 'd0563d46f2dc95dc8c18535efe7b18292128c0e6', 'detections': [], 'link': 'https://www.unpac.me/results/3371a718-17c6-4ee7-8fad-8e3b68ebdb19/'}, {'sha256_hash': '6e95d68102dc761942e67e2337ad8e49d32ee7c8943340489a01e2c56ea6e00b', 'md5_hash': '1bec5ec41f5a88bab602ba15d6d2879d', 'sha1_hash': '859fd0edba414551a48d598141a58fabbb343715', 'detections': [], 'link': 'https://www.unpac.me/results/3371a718-17c6-4ee7-8fad-8e3b68ebdb19/'}, {'sha256_hash': '9cf2c77df0a1a1e854ec1bbc6940d96f508bfb4b0555a07657c77314803a717e', 'md5_hash': 'cee388546abc6dfb7a766a33a8066ff5', 'sha1_hash': 'a41ffb64a859ff3bd32589ce58ac03a84c0b1955', 'detections': ['SUSP_NET_Large_Static_Array_In_Small_File_Jan24'], 'link': 'https://www.unpac.me/results/3371a718-17c6-4ee7-8fad-8e3b68ebdb19/'}, {'sha256_hash': 'a40087c78a18f9d177dfe5fa5f0bec2cf113a80c2ffbe4d0ec3d582b067120d5', 'md5_hash': 'ebebb49c1d1e6f35febe4b8d4138f7b5', 'sha1_hash': '00337a0af8352464407d9b8f114ad798ba99bee5', 'detections': [], 'link': 'https://www.unpac.me/results/3371a718-17c6-4ee7-8fad-8e3b68ebdb19/'}, {'sha256_hash': '289a4eea79baa4141744e44d60db713e18b5f23322663c63047962f51b467614', 'md5_hash': '48979a1a6d3badea8124bce04b1e01a5', 'sha1_hash': '06931bd96343ce167eda796112a30ca8d9fa536a', 'detections': [], 'link': 'https://www.unpac.me/results/3371a718-17c6-4ee7-8fad-8e3b68ebdb19/'}, {'sha256_hash': 'a980a4c044edd3bd118742814dec48d56506e6f40675c60defd5e85ce0f5ec20', 'md5_hash': '06f620d184bc8ffc52de73e453b6a62a', 'sha1_hash': '0ff1dbbc90aa09a9cd43e4f87f6eb357b0b55d7f', 'detections': ['INDICATOR_RMM_ConnectWise_ScreenConnect'], 'link': 'https://www.unpac.me/results/3371a718-17c6-4ee7-8fad-8e3b68ebdb19/'}, {'sha256_hash': '10933424536d53e397f651915f862c933199c50722943c236b020787b2e8f147', 'md5_hash': 'c261e034df63aca035d7914d354b9dca', 'sha1_hash': '50e59350f4b524e55eec1a7ee0531bf9ad33a33b', 'detections': ['SUSP_NET_Shellcode_Loader_Indicators_Jan24', 'INDICATOR_RMM_ConnectWise_ScreenConnect'], 'link': 'https://www.unpac.me/results/3371a718-17c6-4ee7-8fad-8e3b68ebdb19/'}, {'sha256_hash': '528242c7745783b3b4ae72fec13bb9bd49b17b0e00f60c027351147f21fdd359', 'md5_hash': 'dc1e764763d65555086850eba51af5c4', 'sha1_hash': '66043dbac97f3b86c019c218e5b127bb7e4441b8', 'detections': [], 'link': 'https://www.unpac.me/results/3371a718-17c6-4ee7-8fad-8e3b68ebdb19/'}, {'sha256_hash': '19ac323ca6eae2f8145cdc2bac865b32cd5a48ad6ff199d4ca7da214b056e1dc', 'md5_hash': '5fb6074b08ac4709cf2f29fa5b49023e', 'sha1_hash': '8bbb78a47c08867c50572f0bd2a27171f91e0454', 'detections': [], 'link': 'https://www.unpac.me/results/3371a718-17c6-4ee7-8fad-8e3b68ebdb19/'}, {'sha256_hash': '4e8de6683206a607d12bc32f2c4316cb37992ffcfade7f2ae3a84fb5cf492a9a', 'md5_hash': 'd6c08447040e5e6b591483c4780dbd7a', 'sha1_hash': 'a10af25f44a08afe10821d009b71e55e756ae5b4', 'detections': [], 'link': 'https://www.unpac.me/results/3371a718-17c6-4ee7-8fad-8e3b68ebdb19/'}, {'sha256_hash': 'ad6062215032ab58369403b1221562b5e7fb5ae7d52b29b7fad69eefb2d8455b', 'md5_hash': '723f2aaeeda1d2bb2f49322da349ffc9', 'sha1_hash': 'ac6ab994beaff69adf8a2dc480a8a628175ff6c8', 'detections': [], 'link': 'https://www.unpac.me/results/3371a718-17c6-4ee7-8fad-8e3b68ebdb19/'}, {'sha256_hash': 'df431539a35b117118fb0cb10a37d2395a68ce3b7506b5e3f3aeaf3cd8790fe1', 'md5_hash': '1e00080be9c04de5ff4026e7dbdf8232', 'sha1_hash': 'cb1fb1d36524f18d0d1b6b1cd50c7ca683ad27e5', 'detections': [], 'link': 'https://www.unpac.me/results/3371a718-17c6-4ee7-8fad-8e3b68ebdb19/'}, {'sha256_hash': '9342c7be8036a5f8dc3895d75e3314dce961fd3bc70ee59928c67fa04f0c7e08', 'md5_hash': '5419ff27205d3e5affa3fc18b811b843', 'sha1_hash': 'cf49072c50456381cd26cd32cb97606c5f5cfd26', 'detections': [], 'link': 'https://www.unpac.me/results/3371a718-17c6-4ee7-8fad-8e3b68ebdb19/'}, {'sha256_hash': 'c51a2b5cb5054ec0136e332bf290c8af3392d7936b5137a07423df08ab33d264', 'md5_hash': 'd9ef4f245159eb7374677f603e18b9ec', 'sha1_hash': 'e7aa0b8bce504d31323d10dd987fa2d517649191', 'detections': ['INDICATOR_RMM_ConnectWise_ScreenConnect'], 'link': 'https://www.unpac.me/results/3371a718-17c6-4ee7-8fad-8e3b68ebdb19/'}]
  • Kaspersky: Adware

Indicators of Compromise

If you're hunting for this sample or related ConnectWise activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:

  • SHA-256 hash: 66ca66cae93c34e60a9a328b082fc7aa5396cc046bcfc5a14681d072128b9be7
  • Filename pattern: ScreenConnect.ClientSetup.exe
  • File type: exe
  • Behavioral tags: ConnectWise, exe, signed

How to Check If You're Affected

  1. Search your endpoint logs for the SHA-256 66ca66cae93c34e60a9a328b082fc7aa5396cc046bcfc5a14681d072128b9be7. Most EDR platforms support historical hash searches across all monitored hosts.
  2. Check for the filename ScreenConnect.ClientSetup.exe in recently downloaded files, email attachments, and installer bundles.
  3. Look for outbound connections to uncommon TLDs or newly registered domains — ConnectWise typically beacons to command-and-control infrastructure shortly after execution.
  4. Review scheduled tasks and registry run keys — this family commonly establishes persistence through standard Windows autorun locations.
  5. Run an updated AV or EDR scan across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.

What to Do If You Find It

If you find evidence of this sample or related activity on your systems:

  1. Isolate the affected host from the network immediately to prevent lateral movement.
  2. Capture memory and disk images before rebooting. Reboots destroy critical forensic evidence, especially in RAM.
  3. Rotate credentials that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. ConnectWise frequently targets these.
  4. Check for secondary payloads. ConnectWise is often a stepping stone for additional malware including ransomware or banking trojans.
  5. Report the incident to your security team. For larger organizations, consider notifying your regional CERT.

Free Threat Lookups

You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at threatchain.io/lookup and get results across multiple intel sources in seconds.

For cross-referencing this specific sample, you can also look it up directly on MalwareBazaar where the original submission and vendor analysis is recorded.

Top comments (0)