MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2fd40cda28806cc5aee53c76098f41dcadfc228e7c43bc84f8d3f6291314be3f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA 2 File information Comments

SHA256 hash: 2fd40cda28806cc5aee53c76098f41dcadfc228e7c43bc84f8d3f6291314be3f
SHA3-384 hash: acea334782017e398d2f25112946de38ca11ba6ed1961bd0bfc09a4ce28fdcef9b341bb6a000ea1829c15285342fb9b1
SHA1 hash: 8b53df7248cb62cba75414eb1922ffb567e9a054
MD5 hash: 678bf948fc12a42bab7d7378e13ac4f0
humanhash: connecticut-bravo-wyoming-king
File name:VRM0193920034.zip
Download: download sample
File size:498 bytes
First seen:2024-10-25 16:26:21 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12:5xanE4aoLSsoOOhuBqvWfKgqmhDkMbaRiQecM:eE4+OauBqef7xhDkMb9
TLSH T1DDF0A3808D190527F33E5B34F39E68939024B58DD42E55561D41A2B34542CC18D9E351
Magika zip
Reporter JAMESWT_WT
Tags:AgidCert Spam-ITA zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
82
Origin country :
IT IT
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:FAT.Nr 01993292432.url
File size:176 bytes
SHA256 hash: daf56f9a7514364c54cee70f342df68dec167bb06bed51ce272fd5a1b58276d1
MD5 hash: 7fcd8b4fa9fe428f64cfc4042df51546
MIME type:text/plain
Vendor Threat Intelligence
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Methodology_Suspicious_Shortcut_SMB_URL
Author:@itsreallynick (Nick Carr), @QW5kcmV3 (Andrew Thompson)
Description:Detects remote SMB path for .URL persistence
Reference:https://twitter.com/cglyer/status/1176184798248919044

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments