MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4597fb073df8eea090d115dbd402ad170ff056a924a9bb95d6a6d2d344e925d0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA 1 File information Comments

SHA256 hash: 4597fb073df8eea090d115dbd402ad170ff056a924a9bb95d6a6d2d344e925d0
SHA3-384 hash: 336e527dfd62d46720218e6e6ca0c27bee84409660c49802fa7635ccf4bfd2e8e2e3d43bbcf01f9e6140b6f5a9b6e826
SHA1 hash: 9f46f41b025bb2778dc560de9dc96dc6e47b6c1f
MD5 hash: 9eb9b788ab21d2e6c02dc53d91c7325f
humanhash: orange-twenty-oklahoma-cold
File name:zigransomchallenge.zip
Download: download sample
File size:648'245 bytes
First seen:2025-08-12 14:00:10 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:qkILP8RI/oXiOPqgbsqOFFkfKdnjgVRCl0i4YWDRS0ycWvZ6BTfff:qBLPUsovPIuLVRClvrqSXcWvEBLf
TLSH T189D4331BEBE6A40F61394DD95DDA50E1E187253AD8C5B8382B23B0A8C43CCBC72795D7
Magika zip
Reporter kagan
Tags:zip


Avatar
kagan
zigransomchallenge

Intelligence


File Origin
# of uploads :
1
# of downloads :
140
Origin country :
TR TR
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Setup.exe
File size:0 bytes
SHA256 hash: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
MD5 hash: d41d8cd98f00b204e9800998ecf8427e
MIME type:inode/x-empty
Vendor Threat Intelligence
Gathering data
Threat name:
Binary.Trojan.Generic
Status:
Suspicious
First seen:
2025-08-12 14:17:38 UTC
File Type:
Binary (Archive)
AV detection:
3 of 37 (8.11%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments