MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 12316be2b95f53e09eb8b53f430a963bd2f435f96d8ed6f67e2031fe04223e08. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 8 File information Comments

SHA256 hash: 12316be2b95f53e09eb8b53f430a963bd2f435f96d8ed6f67e2031fe04223e08
SHA3-384 hash: 8a5866ed6d7f9ea24eac8c7fa8fb351722e1d097c10186e9744f5773fa82b5fc5e2d2f0b468071b06a7f160221f88cb7
SHA1 hash: 88840cacb7d4fb01e3958c52d3b8eaa63382fe83
MD5 hash: f3eb9576e05b59a28130793bd455d256
humanhash: zulu-fix-cold-maine
File name:BOT-1.0-alpha.2.zip
Download: download sample
File size:1'386'736 bytes
First seen:2025-12-23 14:38:09 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 24576:YyJeXoZjxbq9j8XJlqrGAuImQIMESQ+hcqMXHC0Clwi6/CttWaRj:9AoZ9bq+MmMEL+hcjXHC/wnwdj
TLSH T18F55339A407D29844F3D0A6377EF9A1C91108AFC10420C736B6A98DB663E7DFC77499B
Magika zip
Reporter freedevgraph
Tags:zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
6
Origin country :
US US
File Archive Information

This file archive contains 4 file(s), sorted by their relevance:

File name:lua51.dll
File size:3'531'914 bytes
SHA256 hash: c7a657af5455812fb215a8888b7e3fd8fa1ba27672a3ed9021eb6004eff271ac
MD5 hash: 4ebd617a3ad9a9619172bd14a902a400
MIME type:application/x-dosexec
File name:luajit.exe
File size:100'900 bytes
SHA256 hash: 5343326fb0b4f79c32276f08ffcc36bd88cde23aa19962bd1e8d8b80f5d33953
MD5 hash: 00f60ee3ff2dee681b5d7d442009b2c2
MIME type:application/x-dosexec
File name:clib.txt
File size:341'209 bytes
SHA256 hash: 593916916552ce87cd6fde7353875e023cd8a89f13d222fc636634a43ff65cdb
MD5 hash: dd76846d31e2aa2f5e8c70588d51c2df
MIME type:text/plain
File name:Launcher.cmd
File size:43 bytes
SHA256 hash: 964dfb63ff140149ed8b310dba63fd8d82a82dc9979348e93b3dd7206fd71d13
MD5 hash: 7eb6dac341fad662bf2bedfce7a7fdce
MIME type:text/plain
Vendor Threat Intelligence
Verdict:
Malicious
Score:
70%
Tags:
injection obfusc virus
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug mingw overlay packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Zip Archive
Result
Malware family:
n/a
Score:
  6/10
Tags:
execution
Behaviour
Suspicious use of WriteProcessMemory
Looks up external IP address via web service
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Capability_Embedded_Lua
Author:Obscurity Labs LLC
Description:Detects embedded Lua engines by looking for multiple Lua API symbols or env-var hooks
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:HUNTING_SUSP_TLS_SECTION
Author:chaosphere
Description:Detect PE files with .tls section that can be used for anti-debugging
Reference:Practical Malware Analysis - Chapter 16
Rule name:pe_detect_tls_callbacks

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments