MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7c5fdcdde28760aa513d1c04aa8766a9318d39633014cecf8d2cfa0e9aa19391. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA 12 File information Comments

SHA256 hash: 7c5fdcdde28760aa513d1c04aa8766a9318d39633014cecf8d2cfa0e9aa19391
SHA3-384 hash: 100431703f3cc06fbb2355829801813b7f09b21443a94e38428fa55062d37228e3925e2256f15ce0b0c02649dc6b7fab
SHA1 hash: b5209943109b8513c75dfe2bf42e028ae87772d2
MD5 hash: adbbe50b465e288d2dbec57723834c8a
humanhash: mississippi-music-seventeen-juliet
File name:backdoor.zip
Download: download sample
File size:1'101'106 bytes
First seen:2026-05-05 08:50:26 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 24576:qPx7aaiwqhuyfMFN3sCw2d07EcQifn9cpcALEirPEOpwAHEErPuq:qPx7aafqMLsCwm0Ac9FowiDEEkEDuq
TLSH T17A35337AF36F3B2BDD15D03690691FB676F4ADEB3DA3FC919A988708265C4311A0C052
Magika zip
Reporter smica83
Tags:zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
97
Origin country :
HU HU
File Archive Information

This file archive contains 10 file(s), sorted by their relevance:

File name:DllSafeCheck64.dll
File size:1'033'216 bytes
SHA256 hash: 8728a77d612029c2defac896dff218ece6d8302f1bc79cefedca76df219848a2
MD5 hash: 368d9ed5aade6e5f19184e7ada45eb2e
MIME type:application/x-dosexec
File name:svchost.exe
File size:78'456 bytes
SHA256 hash: cf58e424b86775e6f2354291052126a646f842fff811b730714dfbbd8ebc71a4
MD5 hash: d58a8a987a8dafad9dc32a548cc061e7
MIME type:application/x-dosexec
File name:1 - Desktop.lnk
File size:1'109 bytes
SHA256 hash: 2f1cb8a49833e7b9083bdc26a9931f8eef57c4068a5a4177e596d0c6ae04b3b8
MD5 hash: fb99c516cba2f334dd31dbfae0a1b9a7
MIME type:application/octet-stream
File name:dxgi.dll
File size:233'984 bytes
SHA256 hash: 6ca89f2a22afa07cdbf317dee2091e20cf02dad0b398e50189764da4c660845a
MD5 hash: d105e002eb09cad744c6d7255e647dab
MIME type:application/x-dosexec
File name:DllSafeCheck64.exe
File size:1'309'872 bytes
SHA256 hash: 3244f6ee2aeb3c58f43598e48a2531702200fcfa7e6e856d96e77596a62fb013
MD5 hash: 703178380598269e4cb9a4e6e180ea12
MIME type:application/x-dosexec
File name:Operationexception.log
File size:2'898 bytes
SHA256 hash: 328fcb5edd6c53baf989cc12e5c84adb12f64784d4aec355ed7c4148c6ad6fd1
MD5 hash: 099dc400c2d01c8c0b6db4c59962c416
MIME type:application/octet-stream
File name:DllSafeCheck64.ini
File size:294 bytes
SHA256 hash: f41d49f0ba0551618382eb7a5af77b3d7a1b8508a885e39d11c0e46037512849
MD5 hash: fec35df63b7284ad571fd2ce33ed41d9
MIME type:application/octet-stream
File name:a.txt
File size:1'716 bytes
SHA256 hash: 15a9e36950023a0cd8a51bc3d377487d04f270270fbb8058d151cbcf4e69fb82
MD5 hash: c42a8bd07f558c4b8b4ff1d518fa8bae
MIME type:text/plain
File name:virus.zip
File size:136'013 bytes
SHA256 hash: 7bb76436834111c516a227f10360476af5632130cac643852267102c6344d9fb
MD5 hash: 35899d240f4cd309cd01c64a9e37dc67
MIME type:application/zip
File name:desktop.ini
File size:75 bytes
SHA256 hash: 5047110d0df7b37cbc100c4e6b534643e4de9db35bd9e2d6aaa0b7c743c7fcd4
MD5 hash: 22f192fb4c42df0a72a2fa00f41ce01a
MIME type:application/x-wine-extension-ini
Vendor Threat Intelligence
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable LNK PDB Path PE (Portable Executable) PE File Layout Zip Archive
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_OutputDebugStringA_iat
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__MemoryWorkingSet
Author:Fernando Mercês
Description:Anti-debug process memory working set size check
Reference:http://www.gironsec.com/blog/2015/06/anti-debugger-trick-quicky/
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Reference:https://cyfare.net/
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments