MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 30457d2c9e234e883a9ae93ce2f12e49ec9e41ae108eae5911a087b0548a3c04. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 9 File information Comments

SHA256 hash: 30457d2c9e234e883a9ae93ce2f12e49ec9e41ae108eae5911a087b0548a3c04
SHA3-384 hash: 9c35a4af7763c356b76dde359e12317f35e42cf98d908a6b14ef9435ffafff4e3dcc195506b9aa3e5fd65995b24e4795
SHA1 hash: b58567b898e4cf72f67860e7bda4c6b57c7c26ca
MD5 hash: 93dbbcf2609ef41b3f41ed1618a5a9b7
humanhash: hotel-alabama-white-hydrogen
File name:test_office_cert.zip
Download: download sample
File size:3'720'696 bytes
First seen:2026-04-08 11:46:08 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 98304:Zu+F7y0p3cRAC8iNc2RJm/37JzFirA7Pqrz/d2dZdBl:0+FPp38qiNcEJ+37JZiLF2dBl
TLSH T1BF063381D1DBCC76978DEED74CCBCA7D236A600A58E066A7860515F2CFE24ACE45C9CC
Magika zip
Reporter smica83
Tags:zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
85
Origin country :
HU HU
File Archive Information

This file archive contains 7 file(s), sorted by their relevance:

File name:vcruntime140_1.dll
File size:60'448 bytes
SHA256 hash: c40c87a4974f48f324c8df06380961c81e629ddfbddb6e3dad6be5788341d8d5
MD5 hash: 5b355f4a4eed4dec2a51bd4b60c226af
MIME type:application/x-dosexec
File name:engsvc.exe
File size:1'554'240 bytes
SHA256 hash: b7fab98fc8a163c6212e36d5227b4e1dea0ac02c05642ccf114c4db1a9a3b678
MD5 hash: 47d6cc7ba4d12c558952d31191d68188
MIME type:application/x-dosexec
File name:C2R64.dll
File size:2'339'104 bytes
SHA256 hash: 7d0104b04f87946ae93be660ed43f87cf123e1c5716c123c68480dd220c3c654
MD5 hash: d59e0e264183e2d0b4f01f4bb00d2cf7
MIME type:application/x-dosexec
File name:vcruntime140.dll
File size:135'192 bytes
SHA256 hash: 9e6709b94fd0865a7d5e24dbff452de22cd7fdf2a8d8d2aa50ab6a4a19a48b96
MD5 hash: e099f3af9442e066b12af5241713697f
MIME type:application/x-dosexec
File name:local525.tmp
File size:2'151'028 bytes
SHA256 hash: 0f5b6ed05a06bcc5f828c1d84e2d16db5e761a514054beea3a6d2dda74e0ff47
MD5 hash: ce8d5d91bd1bf4868f2d689cf33fbd73
MIME type:application/octet-stream
File name:msvcp140.dll
File size:568'320 bytes
SHA256 hash: bdd76e0f0bcc0b33134e0cc0f99d8eef08cf0db003b344e27ee899d6de654518
MD5 hash: cc84f2bab018c36ec148152d22e60822
MIME type:application/x-dosexec
File name:AppvIsvSubsystems64.dll
File size:39'144 bytes
SHA256 hash: 836b1b78809a7272bee69370325f55d75d7563851bcd948abb127975eebd0a3a
MD5 hash: 8e89c5f72dc811f3b5629c73e2c6fe96
MIME type:application/x-dosexec
Vendor Threat Intelligence
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
anti-debug anti-vm microsoft_visual_cc signed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Threat name:
Win32.Trojan.Suschil
Status:
Malicious
First seen:
2026-04-07 13:52:16 UTC
File Type:
Binary (Archive)
Extracted files:
399
AV detection:
16 of 38 (42.11%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
collection discovery persistence spyware stealer
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Browser Information Discovery
Accesses Microsoft Outlook profiles
Adds Run key to start application
Checks installed software on the system
Looks up external IP address via web service
Executes dropped EXE
Loads dropped DLL
Reads WinSCP keys stored on the system
Reads user/profile data of web browsers
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_OutputDebugStringA_iat
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__MemoryWorkingSet
Author:Fernando Mercês
Description:Anti-debug process memory working set size check
Reference:http://www.gironsec.com/blog/2015/06/anti-debugger-trick-quicky/
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments