MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5616c49fc976c1b04c13abd1405119ea224691c257783a5df3436ffe4a4e9290. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA 16 File information Comments

SHA256 hash: 5616c49fc976c1b04c13abd1405119ea224691c257783a5df3436ffe4a4e9290
SHA3-384 hash: 3082500f02fe78c2ce13b690d800468fb74bffc3259c282fea7b7d9fc8b8b58de636d7a7200f3089948d2f396f338e97
SHA1 hash: a2a7fb0795d4c83143de730723145cb214c91493
MD5 hash: 9c01a15fc082e2e4a9fc3ab975d6f0ac
humanhash: stream-sink-magazine-coffee
File name:warn0900.zip
Download: download sample
File size:2'715'571 bytes
First seen:2025-11-23 12:10:10 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 49152:GMNVP1EOP4pbmBTNCRQwjHK8FBg3VOhG7NyES3VTFzA98Hag02ky1bRr8onz:GIVtElz3ekh6P8xzAq2lyHJz
TLSH T1BFC533ACE873EF20E10B8951775645272EEB8FD1B74ECE4B3376B4B11A25A50099930F
Magika zip
Reporter juroots
Tags:zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
77
Origin country :
RO RO
File Archive Information

This file archive contains 26 file(s), sorted by their relevance:

File name:Setup.exe
File size:587'816 bytes
SHA256 hash: 4042267ee4c0ad741397f4807b151137387c4cf0f8029d78555a160bac2422a9
MD5 hash: 804e25c046f6b14f49e62a0cc8a534cf
MIME type:application/x-dosexec
File name:MonInst.ex_
File size:562'688 bytes
SHA256 hash: 8cb293596a321d4da623362af829b4a5c0651a565442cf6e698c7184cb0207bf
MD5 hash: c55dc9612e9b89c79f17fd706af3d600
MIME type:application/x-dosexec
File name:rasapi32XPSP2.dl_
File size:164'889 bytes
SHA256 hash: d68203595c8801ea15b363402220b1486b8f281efa9f8c6c26c1ecf133aed53f
MD5 hash: 4b1ce8c00282b5cef65bdf0fb4f9fc7e
MIME type:application/x-dosexec
File name:rasapi32XPSP3.dl_
File size:164'889 bytes
SHA256 hash: 79bcc69e78ef97932fb5c586bf04f4e4093939b45a354de09ccf79af8141f813
MD5 hash: ae81260b2db943001ad2a54d715f06d6
MIME type:application/x-dosexec
File name:w0svc.ex_
File size:133'632 bytes
SHA256 hash: cb77f35b8de10a658f085d227062c2b11ebce5b8dad9e9df2ab412a9824f483f
MD5 hash: 9cb1808c216f690f934bb17d146f625c
MIME type:application/x-dosexec
File name:Warn0900.ex_
File size:1'873'920 bytes
SHA256 hash: 86db0c96cc2a8adb922f90f13603b6ba4fb3acc6896e41d7d3381aa059904f63
MD5 hash: 8cb8cb31a60a82ee7671884149f64f4a
MIME type:application/x-dosexec
File name:rasapi32XP.dl_
File size:164'889 bytes
SHA256 hash: f99acd998bbd7e0898f9c39ef566bc32d77da2014232626b4ae87629f6e5aa7b
MD5 hash: 9b36119ff415c867bb75cf9827d8eb40
MIME type:application/x-dosexec
File name:rasapi3298.dl_
File size:213'529 bytes
SHA256 hash: 3e778cc8e6180f049a6a99299841203727b99480b98ebbede6263705b44c3f3f
MD5 hash: 474e8f685317fbe2182e6af5381f8ab4
MIME type:application/x-dosexec
File name:warnhelp.ex_
File size:57'920 bytes
SHA256 hash: 57e98bc6b86833cddd60876e1cb24651f08028c059fe12a69ab91d1e926d3216
MD5 hash: 0d9636e19c1a2a4180e415cfa97084e0
MIME type:application/x-dosexec
File name:rasapi3298se.dl_
File size:215'577 bytes
SHA256 hash: 4b8c883adf9cca3c40e2de66c8b10fea174f4497483c0920600e30ec646c09e6
MD5 hash: 5daba3c152460ba73348d353f7553bbc
MIME type:application/x-dosexec
File name:whelper.dll
File size:240'640 bytes
SHA256 hash: d25cf82b2f49a13a106080d9bc6e0e5b8dc500674cb403944205a9bc2dceabeb
MD5 hash: 297f7c40848e4c66f5fd279e6119c698
MIME type:application/x-dosexec
File name:whelp.chm
File size:31'556 bytes
SHA256 hash: f658849efff5778bd7183e3ee687819f8913b5becafdc042ff460060bacc8f67
MD5 hash: 2e8088b76c94459bd405a39b04e0f7c9
MIME type:application/octet-stream
File name:whelper1.dll
File size:473'088 bytes
SHA256 hash: cc600e8dd1a026c488d439a54f1f09b246a961d65b101bbf8f2aa622d0085644
MD5 hash: 3a77e7cd5740740b7969ca8883a2c576
MIME type:application/x-dosexec
File name:reinst.chm
File size:65'486 bytes
SHA256 hash: bbda92cc61fa69987c2952684e0df6e4d4f07c42e8703106850a3e960486330b
MD5 hash: 00211f549bc0c95c8ea2c3b2f2e6c059
MIME type:application/octet-stream
File name:rasapi32NT.dl_
File size:155'673 bytes
SHA256 hash: a6c7d1b31a55e72854c1455da22da4cb0c56fea4fdca6c203726fafbbcaf0d64
MD5 hash: e6ad1b135b89e7672186c869feeabc13
MIME type:application/x-dosexec
File name:Psapi.dll
File size:18'192 bytes
SHA256 hash: d88ad399f7dc2d4830e7af1be3bfbf45aaf75e309f0b6afd8a9c4025bf19930e
MD5 hash: b3d22a483875a61cb2060c7d518effc2
MIME type:application/x-dosexec
File name:rasapi322K.dl_
File size:162'841 bytes
SHA256 hash: a452c2d9fa2d62a057ed9e461f0d60a800c3e58b538819c35a34a450623b4d54
MD5 hash: 79d4907d3e563937435103bf4e80a1c6
MIME type:application/x-dosexec
File name:rasapi32Me.dl_
File size:217'113 bytes
SHA256 hash: 4432065a21efac3060ed14fb9c95b3c3cd93cb6baad96a20cf550bc5b2cbf501
MD5 hash: 198a1caee1c8e6f15e4000ca28076b8b
MIME type:application/x-dosexec
File name:capi.num
File size:68 bytes
SHA256 hash: 7e32d80b22ae9cf0c02e4a73d26915a36adef529f6b608bbb6f4a83efd66a411
MD5 hash: 87610e9b527e329276665492a9fd4c8d
MIME type:application/octet-stream
File name:licence.txt
File size:9'293 bytes
SHA256 hash: ab9f4f5016d81b2482394aa194a777400e6f0bb54d9bcb2bb012e3e8e9495bd5
MD5 hash: bdb0154e0be9f1d3f330e94ae1d92864
MIME type:text/plain
File name:xp2.gif
File size:9'609 bytes
SHA256 hash: 45396a01fad9e614246fc46299f5bee492fe982413610f33727feafa0d1cfb05
MD5 hash: b6955814d9d8bfba660e240d975afc32
MIME type:image/gif
File name:pkclose.wav
File size:7'326 bytes
SHA256 hash: d4ac4058bc35c0f425e89d327a418c45dca12b9d61f9dc72948addc7d4a921c2
MD5 hash: 896da5e1403252b6c3e9b8f77f4ca51d
MIME type:audio/x-wav
File name:ReadMe.txt
File size:2'436 bytes
SHA256 hash: 6c311599579f414f22073769f731a0be0a2c62fb8c0151189f5a2cd89befea7c
MD5 hash: 01e0cd0cdf10a25ece8c2864685d1d45
MIME type:text/plain
File name:xp1.gif
File size:12'179 bytes
SHA256 hash: 0ff035bfe4c48e8c19fe04de7c72f245583ea90745f3aae80bd6b93842cf52f8
MD5 hash: 53d12171b978d35d4a23f79f3d8c95ba
MIME type:image/gif
File name:Setup.ins
File size:1'689 bytes
SHA256 hash: 0a3f966f7149762621cdefdce54c56e80d106f1c55395152b7b86af1abe41921
MD5 hash: 7d1826adaf6c1ad7f034ac84ae0e0e28
MIME type:application/x-setupscript
File name:xp.htm
File size:1'709 bytes
SHA256 hash: 78c9baf5100d32ed9e66d2a665aa1a2b77d205f8891fb5df061a882260587de6
MD5 hash: 1ec3dfbeaf899ac08b3ecaf6af79f09e
MIME type:text/html
Vendor Threat Intelligence
Gathering data
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Clean
File Type:
zip
First seen:
2011-01-26T16:41:00Z UTC
Last seen:
2024-01-31T14:26:00Z UTC
Hits:
~100
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Zip Archive
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:Borland
Author:malware-lu
Rule name:CGISscan_CGIScan
Author:yarGen Yara Rule Generator by Florian Roth
Description:Auto-generated rule on file CGIScan.exe
Rule name:CHM_File_Executes_JS_Via_PowerShell
Author:daniyyell
Description:Detects a Microsoft Compiled HTML Help (CHM) file that executes embedded JavaScript to launch a messagebox via PowerShell
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DbatLoader
Author:Harish Kumar P
Description:Yara Rule to Detect DbatLoader
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

zip 5616c49fc976c1b04c13abd1405119ea224691c257783a5df3436ffe4a4e9290

(this sample)

  
Delivery method
Distributed via web download

Comments