MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 71a13ba4a3776cde8a15a56f41369e512856589a751d126eb0a96c9019a20a65. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Viking


Vendor detections: 15


Intelligence 15 IOCs YARA 9 File information Comments

SHA256 hash: 71a13ba4a3776cde8a15a56f41369e512856589a751d126eb0a96c9019a20a65
SHA3-384 hash: 8ff9513b0c28063cd6d6ea500e1585941737d8d51dad4bc14adbc729ccfae814c3ee3f8e7c65b6fd1fbeb412689ba71f
SHA1 hash: cb71ab8275de40a974f2ef85ef80dff990c3e986
MD5 hash: 15dcdde5c38e01174d1d20b631f69526
humanhash: cold-victor-oscar-delaware
File name:7z.exe
Download: download sample
Signature Viking
File size:591'489 bytes
First seen:2025-06-21 16:40:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 87bed5a7cba00c7e1f4015f1bdae2183 (3'034 x Jadtre, 23 x IcedID, 23 x Blackmoon)
ssdeep 6144:uh46tGdyWE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0G:uh3Nt7a3iwbihym2g7XO3LWUQfh4Co
Threatray 10 similar samples on MalwareBazaar
TLSH T120C40826F6748335D073C0B9C5D2A68AEE7130865B308ACB0286D77C6F676E6D53A731
Magika pebin
dhash icon b2e1b496a6cada72 (13 x LummaStealer, 13 x AsyncRAT, 11 x HijackLoader)
Reporter 5KidRo0t
Tags:exe unknown Viking worm

Intelligence


File Origin
# of uploads :
1
# of downloads :
528
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
7z.exe
Verdict:
Malicious activity
Analysis date:
2025-06-21 16:41:16 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
injection viking looked virus
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context borland_delphi evasive overlay packed packed packed packer_detected viking winupack zero
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Creates an undocumented autostart registry key
Creates files in the recycle bin to hide itself
Disables security and backup related services
Drops executable to a common third party application directory
Drops executables to the windows directory (C:\Windows) and starts them
Infects executable files (exe, dll, sys, html)
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Windows Service Tampering
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1719927 Sample: 7z.exe Startdate: 21/06/2025 Architecture: WINDOWS Score: 100 65 Antivirus detection for dropped file 2->65 67 Antivirus / Scanner detection for submitted sample 2->67 69 Multi AV Scanner detection for submitted file 2->69 71 2 other signatures 2->71 8 7z.exe 1 5 2->8         started        process3 file4 45 C:\Windows\rundl132.exe, PE32 8->45 dropped 47 C:\Windows\Logo1_.exe, PE32 8->47 dropped 49 C:\Users\user\Desktop\7z.exe.exe, PE32+ 8->49 dropped 73 Creates an undocumented autostart registry key 8->73 75 Drops executables to the windows directory (C:\Windows) and starts them 8->75 77 Disables security and backup related services 8->77 12 Logo1_.exe 1001 8->12         started        17 cmd.exe 1 8->17         started        19 net.exe 1 8->19         started        signatures5 process6 dnsIp7 59 192.168.2.100 unknown unknown 12->59 61 192.168.2.101 unknown unknown 12->61 63 98 other IPs or domains 12->63 51 C:\Windows\Dll.dll, PE32 12->51 dropped 53 C:\Users\user\Desktop\7z.exe, PE32 12->53 dropped 55 C:\...\maintenanceservice.exe, PE32 12->55 dropped 57 33 other malicious files 12->57 dropped 79 Creates files in the recycle bin to hide itself 12->79 81 Injects code into the Windows Explorer (explorer.exe) 12->81 83 Writes to foreign memory regions 12->83 85 4 other signatures 12->85 21 net.exe 1 12->21         started        23 net.exe 1 12->23         started        25 explorer.exe 83 5 12->25 injected 27 conhost.exe 17->27         started        29 7z.exe 1 17->29         started        31 conhost.exe 19->31         started        33 net1.exe 1 19->33         started        file8 signatures9 process10 process11 35 conhost.exe 21->35         started        37 net1.exe 1 21->37         started        39 conhost.exe 23->39         started        41 net1.exe 1 23->41         started        43 notepad.exe 25->43         started       
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) Win 32 Exe x86
Threat name:
Win32.Worm.Viking
Status:
Malicious
First seen:
2025-06-21 10:05:00 UTC
File Type:
PE (Exe)
Extracted files:
8
AV detection:
36 of 37 (97.30%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery spyware stealer
Behaviour
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Enumerates connected drives
Drops startup file
Executes dropped EXE
Reads user/profile data of web browsers
Drops file in Drivers directory
Verdict:
Malicious
Tags:
Win.Trojan.Philis-26
YARA:
n/a
Unpacked files
SH256 hash:
71a13ba4a3776cde8a15a56f41369e512856589a751d126eb0a96c9019a20a65
MD5 hash:
15dcdde5c38e01174d1d20b631f69526
SHA1 hash:
cb71ab8275de40a974f2ef85ef80dff990c3e986
SH256 hash:
87a1f451f70885dcd6c4e9c745c84a2ac3ae8268d1e2e74f0490165f4a578e64
MD5 hash:
ce9691f0ef6a1a4fa465239a65e403cc
SHA1 hash:
e5364ef7eeb7666ff8ed96d2d7be3877413df1e8
Detections:
SUSP_XORed_URL_In_EXE
SH256 hash:
8cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525
MD5 hash:
9a1dd1d96481d61934dcc2d568971d06
SHA1 hash:
f136ef9bf8bd2fc753292fb5b7cf173a22675fb3
SH256 hash:
cb09ff94d9a9de86c93beff2fc7487c3024367bf57ac8f47e21cc0f98be7be86
MD5 hash:
b342adcd8c8466f02d24f0947a7a5778
SHA1 hash:
fd6e43111eba4b90926aca24e643177c87a1a53b
Detections:
SUSP_XORed_URL_In_EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:pe_detect_tls_callbacks
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:TeslaCryptPackedMalware
Rule name:Upack024027beta028alphaDwing
Author:malware-lu
Rule name:Upackv01xv02xDwing
Author:malware-lu
Rule name:Upackv024v028AlphaDwing
Author:malware-lu
Rule name:Upackv029Betav031BetaDwing
Author:malware-lu

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments