MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9d7e3e0db26fa6b2c41e0f4947564a42e1621515366cc8bedeefd58368d699aa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 4 File information Comments

SHA256 hash: 9d7e3e0db26fa6b2c41e0f4947564a42e1621515366cc8bedeefd58368d699aa
SHA3-384 hash: 1ffa7cfb4b7b17f869764b877c999b717639cc84ffc497b86cab37180ec17a5a361915651df11bc3f0f9dae1daf3a441
SHA1 hash: b34ee1136ed3ae326e09b732a04dba1831cbade1
MD5 hash: 975256d096f25caa45cdd0dd5eed8fc9
humanhash: bluebird-maryland-pip-vegan
File name:Tunnelling_Certification_Course.zip
Download: download sample
File size:3'434'835 bytes
First seen:2025-12-10 18:38:00 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 49152:jQXaP3e+ejo0wiJltG6azbpDXfajg45rgERLalYKGE04izwwUmom0930qSQ0k6qE:jH3e1J0Df345UyLaHGZ7UZh0qSQb6qKd
TLSH T1E8F533643BC76C44DC76CA9453DD975E5F4127DC16CE02B842828A2DF74369CBCE8A8B
Magika zip
Reporter smica83
Tags:zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
41
Origin country :
HU HU
File Archive Information

This file archive contains 2 file(s), sorted by their relevance:

File name:Tunnelling_Certification_Course․pdf
File size:3'434'336 bytes
SHA256 hash: 0df9cb5b73822a8a44d0122fad943f376a5e5d7bbb927bc86743dff0379fa3fc
MD5 hash: 180c88e45db8a2bcc095f32ca71ab8f6
MIME type:application/x-executable
File name:Instructions.txt
File size:93 bytes
SHA256 hash: 21fbcca1e0fcb5da6cfa17b08be032c7d14263116e3b0a7d687e1296fd39ce11
MD5 hash: 943cc752b70812f707c7c9b7b319d92c
MIME type:text/plain
Vendor Threat Intelligence
Verdict:
Malicious
Score:
70%
Tags:
extens
Verdict:
inconclusive
YARA:
2 match(es)
Tags:
Elf Executable Executable Zip Archive
Threat name:
Win32.Trojan.Egairtigado
Status:
Malicious
First seen:
2025-12-10 18:38:17 UTC
File Type:
Binary (Archive)
Extracted files:
2
AV detection:
10 of 38 (26.32%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
discovery linux upx
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
Writes file to tmp directory
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:upx_packed_elf_v1
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments