MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 57f61ebecbb34a88f9bed18f4436cb11a96c99aa36c18e5add04b4399cb7328a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA 1 File information Comments

SHA256 hash: 57f61ebecbb34a88f9bed18f4436cb11a96c99aa36c18e5add04b4399cb7328a
SHA3-384 hash: 3fc576e3e8c8a1a52fa4d2c80c11d92714949e03ed3b2e4d938d807b5f1f9a03b0515e51e924ea1a950ecb7018652073
SHA1 hash: 7d7aaab3b2d8e8ebf5c925a2c7960c21eb6dfa5f
MD5 hash: c6b422b3d6d6ab4a3955ff4c967f9e4a
humanhash: robin-pluto-stream-sink
File name:lambda-0.1.01.21.11.jar
Download: download sample
File size:19'789'984 bytes
First seen:2026-03-16 22:02:34 UTC
Last seen:Never
File type:Java file jar
MIME type:application/zip
ssdeep 393216:CmRfOwzJYMAOBBwk0hVnjQ/BTlecR//ZyMVW8yqBTnMeO:7fzJYMAOJ2VjELR//o0dE
TLSH T162172312BEB8EB7DE90B82379001C192BD1502E8E007D4AF5478999E1AF5E6F1717BCD
TrID 57.8% (.JAR) Minecraft Fabric Mod (24020/2/4)
32.5% (.JAR) Java Archive (13500/1/2)
9.6% (.ZIP) ZIP compressed archive (4000/1)
Magika jar
Reporter Giveup
Tags:DebuggerPattern__CPUID DebuggerPattern__RDTSC jar java JavaDropper PM_Zip_with_js VAPE_CURIUM


Avatar
Giveup
Auto-submitted by RATScanner (score 65/100, HIGH)

Intelligence


File Origin
# of uploads :
1
# of downloads :
80
Origin country :
US US
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
lambda-0.1.01.21.11.jar
Verdict:
No threats detected
Analysis date:
2026-03-16 22:04:40 UTC
Tags:
java

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
base64 expand lolbin macros-on-close
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments