MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 754c23d951b37c8fdfd48995722a6f87cbfc51006e002b10e4fdb84e1df22382. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 7 File information Comments

SHA256 hash: 754c23d951b37c8fdfd48995722a6f87cbfc51006e002b10e4fdb84e1df22382
SHA3-384 hash: d6a1bd3c658d5a049d24cf13c17e8654449748feb4468a8ceebd48c5f1a327de274835f30d12e0714f1c3f193f2194d1
SHA1 hash: 90381778b671532f39bf15e6e1485bf29e2aa874
MD5 hash: 77570655f244575759bd0713856e1f75
humanhash: spring-oregon-diet-october
File name:PDFreadArticle8784541.zip
Download: download sample
File size:6'043 bytes
First seen:2026-04-20 12:53:45 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 96:jeiPdGUGLxiPdGUGLmiPdGUGLzdiPdGUGLviPdGUGLgiqiZM:j7Y6YfYiYgYMiqMM
TLSH T19DC1C743989D7C87CA9A937EA8451B0C78AC8F75036E4C27B9363DD58C8B8163D4F60B
Magika zip
Reporter smica83
Tags:zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
101
Origin country :
HU HU
File Archive Information

This file archive contains 2 file(s), sorted by their relevance:

File name:0 risk Dice strat 0.01 high profit daily survivability.lnk
File size:2'493 bytes
SHA256 hash: cdcc819d7069daa35c87c678e44cb04c48cacaf7ad32f441202fd1de680b66f1
MD5 hash: b24a0e5f9bae69db54f0d9ed2be3cfcc
MIME type:application/octet-stream
File name:ReadME.txt
File size:50 bytes
SHA256 hash: 3419ddf13d854063ff5031688e9762fcd13ce0b9ba9f4d9702da21e857804af7
MD5 hash: 1da81e6ba90ad26ecc9057ab8231a1dc
MIME type:text/plain
Vendor Threat Intelligence
Verdict:
Malicious
Score:
91.7%
Tags:
infosteal obfuscate shell sage
Verdict:
Malicious
File Type:
zip
First seen:
2026-04-20T10:18:00Z UTC
Last seen:
2026-04-20T12:09:00Z UTC
Hits:
~10
Gathering data
Threat name:
Shortcut.Trojan.Suschil
Status:
Malicious
First seen:
2026-04-19 18:23:11 UTC
File Type:
Binary (Archive)
Extracted files:
6
AV detection:
11 of 24 (45.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Execution_in_LNK
Author:@bartblaze
Description:Identifies execution artefacts in shortcut (LNK) files.
Rule name:LNK_sospechosos
Author:Germán Fernández
Description:Detecta archivos .lnk sospechosos
Rule name:Long_RelativePath_LNK
Author:@bartblaze
Description:Identifies shortcut (LNK) file with a long relative path. Might be used in an attempt to hide the path.
Rule name:Script_in_LNK
Author:@bartblaze
Description:Identifies scripting artefacts in shortcut (LNK) files.
Rule name:SUSP_LNK_CMD
Author:SECUINFRA Falcon Team
Description:Detects the reference to cmd.exe inside an lnk file, which is suspicious
Rule name:SUSP_LNK_SuspiciousCommands
Author:Florian Roth (Nextron Systems)
Description:Detects LNK file with suspicious content
Rule name:Weedhack_Family_Generic
Author:jlab
Description:Generic Weedhack family detection

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments