MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 555f42c53dfd9c633f242ef3baca797365c2daee9af2475db2171d6fc2cd2b57. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 555f42c53dfd9c633f242ef3baca797365c2daee9af2475db2171d6fc2cd2b57
SHA3-384 hash: d321541925d68083b41e09d8996a7e98fd61b09552ea686e97a632f0f742c6d7b11aa9d63acdf67daf7d679dab4358de
SHA1 hash: 7143f1b57d9a6e419e807580d6e5a13878a797ec
MD5 hash: 4076f1d7c690f02d41a386c24ef63a00
humanhash: potato-romeo-triple-one
File name:Oficio_5201042026.exe
Download: download sample
File size:84'950'424 bytes
First seen:2026-04-08 06:28:54 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 88016fcdef7f227c62171d0afad9aae4 (7 x ValleyRAT, 6 x OffLoader, 3 x Gh0stRAT)
ssdeep 1572864:wW7mT8Psdhx+WQXmyAj+cCWgAv3M5J5ilWJ0bsbvmqEN4BkF1EZDOsLE:DmgsMPXmr+cCWBv3KCdb4p8sLE
TLSH T12818333BE18A6579E06E2D363572E210943FBE5169030C1B96FCB04CDF356B11E3EA96
TrID 50.8% (.EXE) Inno Setup installer (107240/4/30)
20.4% (.EXE) InstallShield setup (43053/19/16)
19.7% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
3.0% (.EXE) Win64 Executable (generic) (6522/11/2)
2.1% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon 5050d270cccc82ae (112 x Adware.Generic, 71 x OffLoader, 43 x LummaStealer)
Reporter JAMESWT_WT
Tags:exe oficiospolicia-com signed Stalin-Fabrico-Loor-Romero xx-kak-is

Code Signing Certificate

Organisation:Stalin Fabrico Loor Romero
Issuer:Microsoft ID Verified CS EOC CA 02
Algorithm:sha384WithRSAEncryption
Valid from:2026-04-01T14:29:50Z
Valid to:2026-04-04T14:29:50Z
Serial number: 330007c40a6b2924c691ce681a00000007c40a
Cert Graveyard Blocklist:This certificate is on the Cert Graveyard blocklist
Thumbprint Algorithm:SHA256
Thumbprint: 419a40daaac4e4ae757769aecd92655b6b26ac3bce6bbefb2a51243a0df86c8c
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
125
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Oficio_5201042026.exe
Verdict:
Malicious activity
Analysis date:
2026-04-08 06:29:53 UTC
Tags:
delphi inno installer nodejs

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
93.3%
Tags:
vmdetect delphi
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file
Sending a custom TCP request
Creating a file in the %AppData% directory
DNS request
Connection attempt
Unauthorized injection to a recently created process
Loading a suspicious library
Creating a file in the %AppData% subdirectories
Moving a file to the %AppData% subdirectory
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Gathering data
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-04-08T04:31:00Z UTC
Last seen:
2026-04-08T04:52:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan.Script.Agent.gen
Gathering data
Threat name:
Win32.Trojan.Ravartar
Status:
Malicious
First seen:
2026-04-03 22:00:17 UTC
File Type:
PE (Exe)
AV detection:
15 of 37 (40.54%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
shellcode_loader_008
Similar samples:
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery installer persistence revoked_codesign
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Inno Setup is an open-source installation builder for Windows applications.
System Location Discovery: System Language Discovery
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Executable exe 555f42c53dfd9c633f242ef3baca797365c2daee9af2475db2171d6fc2cd2b57

(this sample)

Comments