MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0f4cf21068c0001605f715d80c8ffd705e7684f43dbad7adaad650f25dd6ddf6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 9 File information Comments

SHA256 hash: 0f4cf21068c0001605f715d80c8ffd705e7684f43dbad7adaad650f25dd6ddf6
SHA3-384 hash: 252268cd963740d38400a05b54eb73330a0cf900ec82162fcf98c9a306b5392b3f8aa051ac2e31fb61d1df609a412e96
SHA1 hash: 10bee11c7eacd0b57e4f923075cb8ba40b626938
MD5 hash: e20ffa07b507c84b7c508f5e43f593ff
humanhash: carbon-delaware-orange-low
File name:Comprobante_Facturacion_66418.pdf_20251210192552674.rev
Download: download sample
File size:15'085'458 bytes
First seen:2025-12-10 19:27:46 UTC
Last seen:Never
File type: 7z
MIME type:application/x-7z-compressed
ssdeep 393216:8hxnOf6HeundePXJ3dmZpipg6/X3M3EivtMnRwg:wxOSH9detdEwg63M0iFMnh
TLSH T1AFE633E060FBE733E08F2A93DE48805A9BFC7BCF12EA54AA454709B52D695215057FCC
TrID 57.1% (.7Z) 7-Zip compressed archive (v0.4) (8000/1)
42.8% (.7Z) 7-Zip compressed archive (gen) (6000/1)
Magika sevenzip
Reporter 1ZRR4H
Tags:7z

Intelligence


File Origin
# of uploads :
1
# of downloads :
12
Origin country :
CL CL
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Comprobante_Facturacion_66418.pdf.exe
File size:20'929'536 bytes
SHA256 hash: e60e8a3c26554d6e7f4f04ed27a7be41f458ea2b8ec3b606e90c334c6a6b6a28
MD5 hash: 9ebe4840f422937f255293d6a7384067
MIME type:application/x-dosexec
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
99.1%
Tags:
underscore vmdetect
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug anti-vm base64 borland_delphi buzus fingerprint installer-heuristic keylogger masquerade overlay packed tiger unsafe zero
Verdict:
Malicious
File Type:
7z
First seen:
2025-12-11T05:46:00Z UTC
Last seen:
2025-12-11T05:57:00Z UTC
Hits:
~10
Gathering data
Gathering data
Threat name:
Win32.Trojan.Etset
Status:
Malicious
First seen:
2025-12-11 05:58:19 UTC
File Type:
Binary (Archive)
Extracted files:
492
AV detection:
13 of 24 (54.17%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:crime_win32_ransom_avaddon_1
Author:@VK_Intel
Description:Detects Avaddon ransomware
Reference:https://twitter.com/VK_Intel/status/1300944441390370819
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:HUNTING_SUSP_TLS_SECTION
Author:chaosphere
Description:Detect PE files with .tls section that can be used for anti-debugging
Reference:Practical Malware Analysis - Chapter 16
Rule name:pe_detect_tls_callbacks
Rule name:reverse_http
Author:CD_R0M_
Description:Identify strings with http reversed (ptth)
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments