MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7fd1f37f932a6959b1ed801cb97c1971339b9fe01b29a091ca7d44a49969e758. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 7fd1f37f932a6959b1ed801cb97c1971339b9fe01b29a091ca7d44a49969e758
SHA3-384 hash: 4b8efa08e39a05d94ae1a5f9292447e32d0813fe6b7c3e34e1605da6122117ed5f6f32e10ffaf4197e6dac2cc7c288c9
SHA1 hash: f553104a9c5f949e8bbb709c4dc2624f78b7e184
MD5 hash: 096eb57ac66496d34e2227df23ef65ad
humanhash: papa-july-steak-blue
File name:Launcher.exe
Download: download sample
File size:12'483'024 bytes
First seen:2026-03-18 19:20:02 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4fafa4097dfb7318c296a9989e1ecb24
ssdeep 196608:NxXyFBC/b8PNA7p8Eel1ssniT73Qgf3+VOa3bnOJrNYBhMxRUWfKmU2:6Fgj8lE+1ssC73QKEbMnKw
TLSH T1CFC622E91AD563B490D24500728B839E75C2254D86FD5C2E3ED73C412728DAF268EFBB
TrID 33.1% (.EXE) Win64 Executable (generic) (6522/11/2)
25.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.4% (.ICL) Windows Icons Library (generic) (2059/9)
10.3% (.EXE) OS/2 Executable (generic) (2029/13)
10.1% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter burger
Tags:exe signed

Code Signing Certificate

Organisation:Oracle Corporation
Issuer:Oracle Corporation
Algorithm:sha256WithRSAEncryption
Valid from:2026-03-17T06:37:15Z
Valid to:2029-03-17T06:47:15Z
Serial number: 581c6820403356b4404e13ed43f3ef91
Thumbprint Algorithm:SHA256
Thumbprint: 2f58ac9a4708ab760eff314df842b3fdbe8dd1aa760d3dbb65ee5a858a2739e7
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
122
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Launcher.exe
Verdict:
Suspicious activity
Analysis date:
2026-03-18 19:20:00 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
DNS request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed signed
Result
Gathering data
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
54 / 100
Signature
AI detected suspicious PE digital signature
Found direct / indirect Syscall (likely to bypass EDR)
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to evade analysis by execution special instruction (VM detection)
Behaviour
Behavior Graph:
Gathering data
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Unpacked files
SH256 hash:
7fd1f37f932a6959b1ed801cb97c1971339b9fe01b29a091ca7d44a49969e758
MD5 hash:
096eb57ac66496d34e2227df23ef65ad
SHA1 hash:
f553104a9c5f949e8bbb709c4dc2624f78b7e184
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:PE_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments