MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 10030b7aabe7b1ca7894032801e0806b8a6212536ec1892a7ba94a714cf92ee5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: 10030b7aabe7b1ca7894032801e0806b8a6212536ec1892a7ba94a714cf92ee5
SHA3-384 hash: 0655a6082ccb95ce95e78e87307106215914a5c7ddf8536f71f1524b4fdad48f5e9dee6c84a14a88ae5707e98e9ca2aa
SHA1 hash: c44bbc681afd6df1bf8e8615f1eb953bb79cbcbc
MD5 hash: 2d55653379abc152e66955da0b98c289
humanhash: golf-sodium-orange-nebraska
File name:b90f64171cb45ad2f8ccc4167b56c322a221fb74a3e0c2731b4657c70916bdb3.zip
Download: download sample
File size:3'983 bytes
First seen:2026-02-27 07:07:49 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 48:9C1toxRFnIVLohfTkzCum+vBBmZnbkpFfpEZ8wJYZLMLuphmo1KIn0Foc6T5tiMc:+ohnIVUYmOvBcZbknps1I0FeVti2GQVA
TLSH T106816D6620FE2522E4DE8A755DFE45C77717EDD578F2881105A70CE47C81A8B121C0CF
Magika zip
Reporter JAMESWT_WT
Tags:html mandatechgroup-com Spam-ITA xtadts-ddns-net zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
52
Origin country :
IT IT
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:b90f64171cb45ad2f8ccc4167b56c322a221fb74a3e0c2731b4657c70916bdb3.html
File size:15'189 bytes
SHA256 hash: b90f64171cb45ad2f8ccc4167b56c322a221fb74a3e0c2731b4657c70916bdb3
MD5 hash: 11ae3774ffa0acf47d37482fdfb13bdb
MIME type:text/html
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.2%
Tags:
phishing virus shell sage
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
aidetect phishing phishing soft-404
Gathering data
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2026-02-27 07:08:22 UTC
File Type:
Binary (Archive)
Extracted files:
1
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  4/10
Tags:
discovery
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Browser Information Discovery
System Time Discovery
Drops file in Program Files directory
Drops file in Windows directory
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:SUSP_obfuscated_JS_obfuscatorio
Author:@imp0rtp3
Description:Detect JS obfuscation done by the js obfuscator (often malicious)
Reference:https://obfuscator.io

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments