MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 641c88e82e110a4e4604dee811198efc83a80a2ce60225c6c3da72f8d6139ecf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 6 File information Comments

SHA256 hash: 641c88e82e110a4e4604dee811198efc83a80a2ce60225c6c3da72f8d6139ecf
SHA3-384 hash: bbe8b90e4dc6c62f597232fa203c7b2dd16f2e262e0376198076377e7bc0dffcf8b0a570923741db1611a79ab891a94b
SHA1 hash: 043e4b73405712ae92a1f6b53f46febc0b5ec549
MD5 hash: 5b1926101fbf99e63d350c044e74d0da
humanhash: india-autumn-artist-april
File name:winrar-x64.exe
Download: download sample
File size:4'264'324 bytes
First seen:2025-11-23 12:09:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7e0a0e8f80bbd1a9c0078e57256f1c3d (5 x GCleaner, 4 x LummaStealer, 3 x CoinMiner)
ssdeep 98304:JzD5kIuoOPS3Yyp5d/lHCJW3ATN1MnFMFa41jCZ0n/rYo:JzDRvW2Yyp5dNZ67IFCjCE/Uo
TLSH T1CB16230AEBE504FCD063A1F4DE924902D3BFBC5D5761E68F17E45A962F132A08D3A721
TrID 48.7% (.EXE) Win64 Executable (generic) (10522/11/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter juroots
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
69
Origin country :
RO RO
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
641c88e82e110a4e4604dee811198efc83a80a2ce60225c6c3da72f8d6139ecf.exe
Verdict:
No threats detected
Analysis date:
2025-10-16 21:45:48 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
virus sage blic
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Changing a file
Modifying an executable file
Creating a file in the Program Files subdirectories
Launching a process
Enabling autorun
Creating a file in the %AppData% subdirectories
Creating a file
Enabling autorun with the shell\open\command registry branches
Result
Gathering data
Verdict:
Unknown
File Type:
exe x64
First seen:
2025-10-16T21:11:00Z UTC
Last seen:
2025-10-16T21:18:00Z UTC
Hits:
~10
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 64 Exe x64
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery persistence privilege_escalation
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Checks installed software on the system
Checks computer location settings
Event Triggered Execution: Component Object Model Hijacking
Executes dropped EXE
Modifies system executable filetype association
Verdict:
Malicious
Tags:
Win.Exploit.Rozena-10038302-0
YARA:
n/a
Unpacked files
SH256 hash:
641c88e82e110a4e4604dee811198efc83a80a2ce60225c6c3da72f8d6139ecf
MD5 hash:
5b1926101fbf99e63d350c044e74d0da
SHA1 hash:
043e4b73405712ae92a1f6b53f46febc0b5ec549
SH256 hash:
267e3f3f4fa5201f980063b289a6140423480b8ba9d6361b5d06a76af709d011
MD5 hash:
6b5ea97f14a6332c110fb37c32d22d97
SHA1 hash:
bf3021e2ce38b4603818dca954b6f9a66e4f5a4a
SH256 hash:
2c29919d7d43b14dcc1cdd7928e786b466a68b1df8f2e324bcf248a761c6c1cf
MD5 hash:
f344e18bc4b0f084af22c834f4fae1ca
SHA1 hash:
663ecf97fffcb5e86bac76d024e5de5192304900
SH256 hash:
2ef068e42bf6e3ae046599e6bd560b283c43df79dbc9a3902b412ba1d008dfab
MD5 hash:
e1a4f64c39743af0d14fd7fbe07e02ed
SHA1 hash:
72b00d671d1281b32b2eda61e36912f028bf1d8f
SH256 hash:
3c7ea2144b1738b30e3c2e1ba952684eb43c704a5ae82a4dd492d607a42c517c
MD5 hash:
120508bcf2e91c722b832b7ac7772a01
SHA1 hash:
bc2590bf89f44ef9c79b3920020ec524fcf4e0d1
SH256 hash:
925a6760e9ca60db33e4bf97e05e3d8bc61d33512d9d0e768b15c3a6bb182963
MD5 hash:
c16c196d1fe409a59cef5f307531a368
SHA1 hash:
6e9933a8b19f228faeb994a49738846605f39e03
SH256 hash:
f63e9db61c0f116327d2473f8686cf020c5b64764b7ca3a0f60a3a4d0df3a541
MD5 hash:
636b26aec83d36e828333c196c5f37e7
SHA1 hash:
ef856a62e85a16a880e4e19e3f25a1dca77d4e02
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 641c88e82e110a4e4604dee811198efc83a80a2ce60225c6c3da72f8d6139ecf

(this sample)

  
Delivery method
Distributed via web download

Comments