MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2efdffd1cf3adab21ff760f009d8893d8c4cbcf63b2c3bfcc1139457c9cd430b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 3 File information Comments

SHA256 hash: 2efdffd1cf3adab21ff760f009d8893d8c4cbcf63b2c3bfcc1139457c9cd430b
SHA3-384 hash: b9364cf10456f87d3d31fd1a979547ffb3dc32002756e3f3247384343599d04f29110239e7410413bc89e98d3f9c0428
SHA1 hash: b25491854b409f454277586d97d2ead28168e6ec
MD5 hash: 646261d89e30c36b938da1d7134691c9
humanhash: hydrogen-butter-harry-high
File name:2efdffd1cf3adab21ff760f009d8893d8c4cbcf63b2c3bfcc1139457c9cd430b
Download: download sample
File size:2'248'928 bytes
First seen:2023-04-25 22:26:00 UTC
Last seen:2025-07-25 16:54:31 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 48aa5c8931746a9655524f67b25a47ef (4 x Adware.Generic, 3 x AsyncRAT, 3 x Vidar)
ssdeep 49152:3mpEKwG7f0e4qkpPNFXbMXuesDNkferBmyYwfPG:0EKwwfjYFFXNesuoPG
Threatray 9 similar samples on MalwareBazaar
TLSH T1B4A53307B3C70073F851593A889AC1441E3BB9B97AE574062D38D90C9B75EC79CB7BA2
TrID 35.1% (.EXE) Win32 Executable Delphi generic (14182/79/4)
26.1% (.EXE) Win64 Executable (generic) (10523/12/4)
11.1% (.EXE) Win32 Executable (generic) (4505/5/1)
7.4% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
5.1% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon e4e4c4a01210b0e6 (1 x CoinMiner)
Reporter Arkbird_SOLG
Tags:exe signed

Code Signing Certificate

Organisation:IObit CO., LTD
Issuer:DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
Algorithm:sha256WithRSAEncryption
Valid from:2022-08-10T00:00:00Z
Valid to:2025-08-30T23:59:59Z
Serial number: 08dce537ffe5af8769f7eec6d4d329b9
Intelligence: 3 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 460a44885c8289f3805184767c62579ba68ad4cfd83c2356351317a9189dd89c
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
262
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
unlocker-setup.exe
Verdict:
Malicious activity
Analysis date:
2023-01-10 01:59:58 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckNumberOfProcessor
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
installer overlay packed shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
suspicious
Classification:
evad
Score:
28 / 100
Signature
Changes security center settings (notifications, updates, antivirus, firewall)
Obfuscated command line found
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Query firmware table information (likely to detect VMs)
Behaviour
Behavior Graph:
behaviorgraph top1 process2 2 Behavior Graph ID: 854043 Sample: f7Spj7UrNO.exe Startdate: 26/04/2023 Architecture: WINDOWS Score: 28 7 f7Spj7UrNO.exe 2 2->7         started        11 svchost.exe 2->11         started        13 svchost.exe 3 2->13         started        15 7 other processes 2->15 file3 40 C:\Users\user\AppData\...\f7Spj7UrNO.tmp, PE32 7->40 dropped 48 Obfuscated command line found 7->48 17 f7Spj7UrNO.tmp 28 61 7->17         started        50 Changes security center settings (notifications, updates, antivirus, firewall) 11->50 20 MpCmdRun.exe 1 11->20         started        52 Query firmware table information (likely to detect VMs) 13->52 signatures4 process5 file6 32 C:\Users\user\AppData\Local\...\RdZone.dll, PE32 17->32 dropped 34 C:\Users\user\AppData\...\IObitUnlocker.dll, PE32 17->34 dropped 36 C:\...\unins000.exe (copy), PE32 17->36 dropped 38 11 other files (9 malicious) 17->38 dropped 22 IObitUnlocker.exe 4 17->22         started        26 regsvr32.exe 17->26         started        28 conhost.exe 20->28         started        process7 dnsIp8 42 cs833182181.wpc.etacdn.net 152.199.20.140, 49702, 80 EDGECASTUS United States 22->42 44 update.iobit.com 22->44 46 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 22->46 30 regsvr32.exe 14 26->30         started        signatures9 process10
Result
Malware family:
n/a
Score:
  4/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Executes dropped EXE
Loads dropped DLL
Unpacked files
SH256 hash:
a4b5afb22bb7b71493d2133b532efcc0b6af4aa72b6e6d10411851bf783adfe7
MD5 hash:
f8bab70aab9a3b05e9463619858580e9
SHA1 hash:
ed08d5e9f431d5086c87a9e5e7a3b066ca83b84b
SH256 hash:
424003bc16ef11dfaea566e012517a807a96d0e42ad84b040f7f5c4442b6497f
MD5 hash:
1205af83ac3a191c2207e0842e97afeb
SHA1 hash:
c6e4b700b529303383b48dac49d2f941022f62b0
SH256 hash:
ae4af747675a0f6d10de4d70f6e059b036398038b7d3cae59b84e6bce4de9e0d
MD5 hash:
1e8fb8572bdebfa04f68db8fafb8791b
SHA1 hash:
9cb711b03978f1d9834e2dbc4a425d3a24c8728c
SH256 hash:
44b8e6a310564338968158a1ed88c8535dece20acb06c5e22d87953c261dfed0
MD5 hash:
9c8886759e736d3f27674e0fff63d40a
SHA1 hash:
ceff6a7b106c3262d9e8496d2ab319821b100541
SH256 hash:
a7ed7676beb28db829c5070930cb21371b21f1393703021beb29f53db8379762
MD5 hash:
c6159cfd2f67ece90a39db5cf4246f93
SHA1 hash:
89c608b7da9b29210d15d9fad815a9f3c900b18c
SH256 hash:
2efdffd1cf3adab21ff760f009d8893d8c4cbcf63b2c3bfcc1139457c9cd430b
MD5 hash:
646261d89e30c36b938da1d7134691c9
SHA1 hash:
b25491854b409f454277586d97d2ead28168e6ec
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments