MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 689be8e10a1e850a62de80bf6c2038c1de09d41bb14a2e1a299b1a0d47e88900. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Arechclient2


Vendor detections: 9


Intelligence 9 IOCs YARA 13 File information Comments

SHA256 hash: 689be8e10a1e850a62de80bf6c2038c1de09d41bb14a2e1a299b1a0d47e88900
SHA3-384 hash: f710d281af3b616e1145b133f3baca824e8fad6753bcc33d2b0389d2d7d258b8824defc17595b3108b652a5c2fe82eea
SHA1 hash: 1547ee301eb803254a215f6755375642944ce9af
MD5 hash: 10c621072b59ffed6c9b405c6b15823c
humanhash: idaho-early-sweet-march
File name:Package.zip
Download: download sample
Signature Arechclient2
File size:6'823'453 bytes
First seen:2026-02-03 15:17:10 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 196608:V6w2u45UNSwvz1JEaVFFk1TPV6az4DwY9Pwk4stI:V6w2cNB1JXFQTtttY9PwkJI
TLSH T18C66E021F5568076E9A70230055C72B751ACAB301B3093CF67D81EAEAFB46C2DEB5793
TrID 51.2% (.SH3D) Sweet Home 3D Design (generic) (10500/1/3)
29.2% (.USDZ) Universal Scene Description Zipped AR format (generic) (6000/1/1)
19.5% (.ZIP) ZIP compressed archive (4000/1)
Magika zip
Reporter aachum
Tags:Arechclient2 dropped-by-ACRStealer HIjackLoader IDATLoader SectopRAT zip


Avatar
iamaachum
http://109.107.165.95/Package.zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
111
Origin country :
ES ES
File Archive Information

This file archive contains 5 file(s), sorted by their relevance:

File name:Dispatch_Lat.exe
File size:2'374'240 bytes
SHA256 hash: f403f804d21d997f6a5edc4d0b817a96a3ed3d15604a940742aa605d33e6b52a
MD5 hash: 3def21e2acb978039450ada9cf559285
MIME type:application/x-dosexec
Signature Arechclient2
File name:Thaetklinveas.mxi
File size:1'902'426 bytes
SHA256 hash: ed075266ee6405c8e38442173d7231ea11e07aafb288ffa88d953dac1b3a0772
MD5 hash: d40d6d9c14ad156c0b5aa1df53b75997
MIME type:application/octet-stream
Signature Arechclient2
File name:Drortshairt.rwk
File size:11'725 bytes
SHA256 hash: a0f9037284d157fdca19ee971757abb06dc71f2733ec198dfd9520d5ab63cc33
MD5 hash: f483f22313f0ac4660cb0b99f5b41f65
MIME type:application/octet-stream
Signature Arechclient2
File name:Microsoft.WITDataStore32.dll
File size:536'136 bytes
SHA256 hash: efe22784f2f3d290abf1d3370cf1e47293657c496b1d8e38043d32d57009697f
MD5 hash: 42bd1abbe27c654c85662ff833279c1b
MIME type:application/x-dosexec
Signature Arechclient2
File name:d3dx9_43.dll
File size:1'998'168 bytes
SHA256 hash: 657b2b7ae184db3d939c2e89ec276a01d225618684a814722522e356dab37df5
MD5 hash: 76b031b8b51d3db4c14c93ba8aeee38e
MIME type:application/x-dosexec
Signature Arechclient2
Vendor Threat Intelligence
Malware configuration found for:
HijackLoader
Details
HijackLoader
an XOR key and XOR-decrypted/LZNT1 decompressed component
Verdict:
Malicious
Score:
70%
Tags:
injection dropper obfusc
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug expired-cert infostealer invalid-signature microsoft_visual_cc signed
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
File Type:
zip
First seen:
2026-02-03T03:00:00Z UTC
Last seen:
2026-02-03T03:13:00Z UTC
Hits:
~10
Gathering data
Result
Malware family:
sectoprat
Score:
  10/10
Tags:
family:hijackloader family:sectoprat discovery loader rat trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Executes dropped EXE
Loads dropped DLL
Detects HijackLoader (aka IDAT Loader)
HijackLoader, IDAT loader, Ghostulse,
Hijackloader family
SectopRAT
SectopRAT payload
Sectoprat family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:APT_Sandworm_ArguePatch_Apr_2022_1
Author:Arkbird_SOLG
Description:Detect ArguePatch loader used by Sandworm group for load CaddyWiper
Reference:https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/
Rule name:Check_OutputDebugStringA_iat
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Arechclient2

zip 689be8e10a1e850a62de80bf6c2038c1de09d41bb14a2e1a299b1a0d47e88900

(this sample)

  
Dropped by
ACRStealer
  
Delivery method
Distributed via web download

Comments