MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9c4f7390cf05d88f7dffeae83d33c0a18d8c25e4f07d6c0c24f90f1fde4afc3f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 5 File information Comments

SHA256 hash: 9c4f7390cf05d88f7dffeae83d33c0a18d8c25e4f07d6c0c24f90f1fde4afc3f
SHA3-384 hash: 6293301750b74c96e7685e844bde4f0c464312f4c519ec074151423bd9295503f5551fb268903dfe9df5f065b5850b4d
SHA1 hash: 6e8bcbc608b0e25e343d15ce7ae1d4e462ec3ac5
MD5 hash: 7c43e2293e1aa0824001251055e6cfad
humanhash: pasta-violet-crazy-nevada
File name:Zeva - CS2.exe
Download: download sample
File size:2'351'104 bytes
First seen:2025-12-03 08:11:25 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 86a37d8dd1c6fe4a60e30cdc359c7bda
ssdeep 49152:T0pCYf+KjfhffduT+rA6EQMynqZOUkN5fME:LO+uhk7vp
TLSH T1C9B5CF42F361C1D9C22299BCC9A3E3A7D3723C644B2142DB37DC5A5DAF976E05E36680
TrID 44.4% (.EXE) Win64 Executable (generic) (10522/11/4)
21.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.ICL) Windows Icons Library (generic) (2059/9)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter juroots
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
71
Origin country :
RO RO
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
Zeva - CS2.exe
Verdict:
No threats detected
Analysis date:
2025-12-03 08:17:11 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.1%
Tags:
dropper shell virus
Result
Gathering data
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-12-02T23:24:00Z UTC
Last seen:
2025-12-02T23:32:00Z UTC
Hits:
~100
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Malware.Heuristic
Status:
Malicious
First seen:
2025-12-03 07:03:52 UTC
File Type:
PE+ (Exe)
Extracted files:
14
AV detection:
21 of 36 (58.33%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Executes dropped EXE
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Downloads MZ/PE file
Gathering data
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:dsc
Author:Aaron DeVera
Description:Discord domains
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 9c4f7390cf05d88f7dffeae83d33c0a18d8c25e4f07d6c0c24f90f1fde4afc3f

(this sample)

  
Delivery method
Distributed via web download

Comments