MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 51ff47c8ab913c1ff76393220ef63c1f029684fe434952e7fe76f9268dc04709. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA 4 File information Comments

SHA256 hash: 51ff47c8ab913c1ff76393220ef63c1f029684fe434952e7fe76f9268dc04709
SHA3-384 hash: c979f92c0652a14a883d9eaaff2fc93603531397b0c7be8bbedf280565486568537fcd36978a3d731ccf39bbc17920cb
SHA1 hash: 0e0f27961472f3a7956ca355b053a793652fed04
MD5 hash: 2de885bb3e90b654cbe496c59e9979c2
humanhash: east-zebra-fruit-glucose
File name:3D STUDIO X beta 4 installer.zip
Download: download sample
File size:2'537'586 bytes
First seen:2025-11-26 16:09:16 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 49152:WtyOaS5kIrf1L3XCzmtMQsRlCUL6FD+ZwCy1iJ2iOPV08/df8jnWAsrJzSMnF0:2FaWBfbCQGAw6FD+ZvpqV0sdf8jnbPMO
TLSH T121C53364A3DB2B14BC40CDD5F62B2D218E56F8EE57939840CD94F3DB5C220A661E8FE4
Magika zip
Reporter juroots
Tags:zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
84
Origin country :
IL IL
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:3D STUDIO X beta 4 installer.exe
File size:3'603'280 bytes
SHA256 hash: a82b44e3da5a21082af49bc98b25ce84669e1eb8fe68e41bc22c2ccca08248d2
MD5 hash: 8ba9879e497dc209a8af8058f6b3b78b
MIME type:application/x-dosexec
Vendor Threat Intelligence
Verdict:
Malicious
Score:
91.7%
Tags:
injection extens obfusc madi
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-debug borland_delphi fingerprint installer-heuristic keylogger overlay overlay packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Zip Archive
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:pe_detect_tls_callbacks
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

zip 51ff47c8ab913c1ff76393220ef63c1f029684fe434952e7fe76f9268dc04709

(this sample)

  
Delivery method
Distributed via web download

Comments