MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 97361a91ba80981ca549ed19b2e2b9250fed6231027cd15418578b3db76b02ab. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 3 File information Comments

SHA256 hash: 97361a91ba80981ca549ed19b2e2b9250fed6231027cd15418578b3db76b02ab
SHA3-384 hash: 510da96664aeb670df23f5a3e2536e0a607e57394a7042d62705e67811d262baf83eb2ea8e4b1d9bfa6cc485612ab5d2
SHA1 hash: 2508e6326ec307d226d79c91e7e123e4a5b5e39e
MD5 hash: 5ae81a09156d61f9c5e05b3f00af5b60
humanhash: mountain-steak-florida-mirror
File name:4_13_1_1389_28.04.2026.rar
Download: download sample
File size:101'162 bytes
First seen:2026-05-13 15:31:32 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 768:DQrQaAvl5mHlN9tttttttttttttttttttttttttttttttttttttttttttttttttx:oY5mHMnXa
TLSH T199A33B130366C8F8DC2F6C173A2C146A7941259036ED4F9AE9C7C69692DF0D63329FE2
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Magika rar
Reporter smica83
Tags:CVE-2025-6218 CVE-2025-8088 rar

Intelligence


File Origin
# of uploads :
1
# of downloads :
71
Origin country :
HU HU
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
rar
First seen:
2026-05-13T07:40:00Z UTC
Last seen:
2026-05-13T14:25:00Z UTC
Hits:
~10
Verdict:
inconclusive
YARA:
1 match(es)
Tags:
Rar Archive
Threat name:
Win32.Trojan.Kepavll
Status:
Malicious
First seen:
2026-05-13 15:32:22 UTC
File Type:
Binary (Archive)
Extracted files:
2
AV detection:
11 of 24 (45.83%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:SUSP_RAR_NTFS_ADS
Author:Proofpoint
Description:Detects RAR archive with NTFS alternate data stream
Reference:https://www.proofpoint.com/us/blog/threat-insight/hidden-plain-sight-ta397s-new-attack-chain-delivers-espionage-rats
Rule name:WinRAR_CVE_2025_8088_Exploit
Author:marcin@ulikowski.pl
Description:Detects RAR archives exploiting CVE-2025-8088 in WinRAR
Reference:https://www.welivesecurity.com/en/eset-research/update-winrar-tools-now-romcom-and-others-exploiting-zero-day-vulnerability/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments