MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 555f42c53dfd9c633f242ef3baca797365c2daee9af2475db2171d6fc2cd2b57. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 12
| SHA256 hash: | 555f42c53dfd9c633f242ef3baca797365c2daee9af2475db2171d6fc2cd2b57 |
|---|---|
| SHA3-384 hash: | d321541925d68083b41e09d8996a7e98fd61b09552ea686e97a632f0f742c6d7b11aa9d63acdf67daf7d679dab4358de |
| SHA1 hash: | 7143f1b57d9a6e419e807580d6e5a13878a797ec |
| MD5 hash: | 4076f1d7c690f02d41a386c24ef63a00 |
| humanhash: | potato-romeo-triple-one |
| File name: | Oficio_5201042026.exe |
| Download: | download sample |
| File size: | 84'950'424 bytes |
| First seen: | 2026-04-08 06:28:54 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 88016fcdef7f227c62171d0afad9aae4 (7 x ValleyRAT, 6 x OffLoader, 3 x Gh0stRAT) |
| ssdeep | 1572864:wW7mT8Psdhx+WQXmyAj+cCWgAv3M5J5ilWJ0bsbvmqEN4BkF1EZDOsLE:DmgsMPXmr+cCWBv3KCdb4p8sLE |
| TLSH | T12818333BE18A6579E06E2D363572E210943FBE5169030C1B96FCB04CDF356B11E3EA96 |
| TrID | 50.8% (.EXE) Inno Setup installer (107240/4/30) 20.4% (.EXE) InstallShield setup (43053/19/16) 19.7% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9) 3.0% (.EXE) Win64 Executable (generic) (6522/11/2) 2.1% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Magika | pebin |
| dhash icon | 5050d270cccc82ae (112 x Adware.Generic, 71 x OffLoader, 43 x LummaStealer) |
| Reporter | |
| Tags: | exe oficiospolicia-com signed Stalin-Fabrico-Loor-Romero xx-kak-is |
Code Signing Certificate
| Organisation: | Stalin Fabrico Loor Romero |
|---|---|
| Issuer: | Microsoft ID Verified CS EOC CA 02 |
| Algorithm: | sha384WithRSAEncryption |
| Valid from: | 2026-04-01T14:29:50Z |
| Valid to: | 2026-04-04T14:29:50Z |
| Serial number: | 330007c40a6b2924c691ce681a00000007c40a |
| Cert Graveyard Blocklist: | This certificate is on the Cert Graveyard blocklist |
| Thumbprint Algorithm: | SHA256 |
| Thumbprint: | 419a40daaac4e4ae757769aecd92655b6b26ac3bce6bbefb2a51243a0df86c8c |
| Source: | This information was brought to you by ReversingLabs A1000 Malware Analysis Platform |
Intelligence
File Origin
# of uploads :
1
# of downloads :
125
Origin country :
ITVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Oficio_5201042026.exe
Verdict:
Malicious activity
Analysis date:
2026-04-08 06:29:53 UTC
Tags:
delphi inno installer nodejs
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
93.3%
Tags:
vmdetect delphi
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file
Sending a custom TCP request
Creating a file in the %AppData% directory
DNS request
Connection attempt
Unauthorized injection to a recently created process
Loading a suspicious library
Creating a file in the %AppData% subdirectories
Moving a file to the %AppData% subdirectory
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Gathering data
Verdict:
Malicious
Labled as:
Generik_EIXOMQY_trojan
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-04-08T04:31:00Z UTC
Last seen:
2026-04-08T04:52:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan.Script.Agent.gen
Score:
53%
Verdict:
Susipicious
File Type:
PE
Gathering data
Verdict:
Malicious
Threat:
Trojan.Script.Agent
Threat name:
Win32.Trojan.Ravartar
Status:
Malicious
First seen:
2026-04-03 22:00:17 UTC
File Type:
PE (Exe)
AV detection:
15 of 37 (40.54%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
8/10
Tags:
discovery installer persistence revoked_codesign
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Inno Setup is an open-source installation builder for Windows applications.
System Location Discovery: System Language Discovery
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
exe 555f42c53dfd9c633f242ef3baca797365c2daee9af2475db2171d6fc2cd2b57
(this sample)
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.