MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8ab9b30fd54bd193ff8cea63ae76a65b28dc66b2be08e86fe33d608a76b84a1b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Efimer


Vendor detections: 9


Intelligence 9 IOCs YARA 21 File information Comments

SHA256 hash: 8ab9b30fd54bd193ff8cea63ae76a65b28dc66b2be08e86fe33d608a76b84a1b
SHA3-384 hash: ffffd4aea5ec8d5e57d81e5f0792ff127698d6860dab9ae0eff8505bcd1c55450ab6b0437934f7be01d67aa1b6f5ab85
SHA1 hash: ec528664e6a84816adba8eb36a9637fab03fbd5a
MD5 hash: f8230acf56d933ef898d61d46a3bcba6
humanhash: georgia-three-bakerloo-papa
File name:movie_22505.zip
Download: download sample
Signature Efimer
File size:3'933'554 bytes
First seen:2025-08-05 14:56:36 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 98304:rtQGMXL+pw8KaB7NoFcHrcX2soWrME5KIVuan8JSiUJtITpk3Zv:raGMOwg7NoEmrNVMJKJtITpk3Zv
TLSH T1A0063307B17E045D761855C8B0601BA37B612983B8C6934E63FB6B938FED931C25BE9C
TrID 66.6% (.FB2K-COMPONENT) foobar2000 component (8000/1/2)
33.3% (.ZIP) ZIP compressed archive (4000/1)
Magika zip
Reporter aachum
Tags:cgky6bn6ux5wvlybtmm3z255igt52ljml2ngnc5qp3cnw5jlglamisad Efimer rezipped Tor zip


Avatar
iamaachum
https://onhoneycomb.com/?tv=3361050874

C2: http://cgky6bn6ux5wvlybtmm3z255igt52ljml2ngnc5qp3cnw5jlglamisad.onion/route.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
31
Origin country :
CZ CZ
File Archive Information

This file archive contains 4 file(s), sorted by their relevance:

File name:svcup.exe
File size:8'984'064 bytes
SHA256 hash: 6b866c187a0dee2fb751a8990d50dc1ed83f68e025720081e4d8e27097067dc8
MD5 hash: 5d132fb6ec6fac12f01687f2c0375353
MIME type:application/x-dosexec
Signature Efimer
File name:btdlg.js
File size:34'034 bytes
SHA256 hash: 827bde9f43a79da6a622f52bf5541a535e16d4d1718e46261268d5047b29dd50
MD5 hash: 82bd884c6cd400320f32e0dbe875a15f
MIME type:text/plain
Signature Efimer
File name:declaration.exe
File size:666'624 bytes
SHA256 hash: 65f5cbc86c5a53554b820668976acba6db0646afc735415225d814110daacf09
MD5 hash: 914d73c6059ac6cef1058dc8d047142f
MIME type:application/x-dosexec
Signature Efimer
File name:defendnot.dll
File size:437'760 bytes
SHA256 hash: 99002686f3e988d6930b18f983fe52b1c6a8a6ff29f223cf8841c25c76136fc8
MD5 hash: c40dc5157aaba2907fc2accf44359c68
MIME type:application/x-dosexec
Signature Efimer
Vendor Threat Intelligence
Verdict:
Malicious
Score:
92.5%
Tags:
virus
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
fingerprint microsoft_visual_cc redcap virus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
Executable PDB Path PE (Portable Executable) Zip Archive
Verdict:
Malicious
Threat:
HEUR:HackTool.Script.Efimer
Threat name:
Script-JS.Hacktool.DefendNot
Status:
Malicious
First seen:
2025-08-05 17:12:31 UTC
File Type:
Binary (Archive)
Extracted files:
6
AV detection:
25 of 37 (67.57%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
execution
Behaviour
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
Checks computer location settings
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:botnet_plaintext_c2
Author:cip
Description:Attempts to match at least some of the strings used in some botnet variants which use plaintext communication protocols.
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Active
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:pe_detect_tls_callbacks
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:SUSP_obfuscated_JS_obfuscatorio
Author:@imp0rtp3
Description:Detect JS obfuscation done by the js obfuscator (often malicious)
Reference:https://obfuscator.io
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/
Rule name:WHIRLPOOL_Constants
Author:phoul (@phoul)
Description:Look for WhirlPool constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Efimer

zip 8ab9b30fd54bd193ff8cea63ae76a65b28dc66b2be08e86fe33d608a76b84a1b

(this sample)

  
Delivery method
Distributed via web download

Comments