MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a3030da80aa5f0d4696f47aeaaf4e32884f1b5addc0102ee0050a6efeac96574. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 12


Intelligence 12 IOCs YARA 3 File information Comments

SHA256 hash: a3030da80aa5f0d4696f47aeaaf4e32884f1b5addc0102ee0050a6efeac96574
SHA3-384 hash: 6c742297ca64486217111ddebf2e0bb9e79c49ec92eb171783e4f6bce0c4f49b62b1d9ea159cb15a08c8caf24645479a
SHA1 hash: 6adbf0f6c074b9d74e40b20fec00cd4acb88ae47
MD5 hash: 27bb839db93a5ffefa949415ed7ff4cd
humanhash: missouri-lion-helium-comet
File name:setup.exe
Download: download sample
File size:6'976'512 bytes
First seen:2026-05-15 00:44:18 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 94439b5cb38d5f14fd65eb5e1da5059d
ssdeep 196608:aa04SCC6YeWZQM7hr0GVJ6kgaaoPx6Kfbt8:aaxa6YeWZP7hIa6kXayz8
TLSH T147660112BB40D062E55701B4751DE7A65078BA30466A8883F7C4BF1FB9B0BD2EA39F47
TrID 50.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
10.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.5% (.EXE) Win64 Executable (generic) (6522/11/2)
8.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.2% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter aachum
Tags:Adware.Neoreklami dropped-by-Adware.DownloadAssistant exe


Avatar
iamaachum
http://194.87.138.68/a/setup.exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
114
Origin country :
ES ES
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
http://cloudsaze.com/file/16019d0
Verdict:
Malicious activity
Analysis date:
2026-05-14 16:34:09 UTC
Tags:
downloadassistant adware stealer remus inno installer delphi neoreklami loader golang raccoonclipper

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
90.9%
Tags:
malware
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-debug fingerprint microsoft_visual_cc packed reconnaissance
Verdict:
Adware
File Type:
PE
First seen:
2026-05-14T21:58:00Z UTC
Last seen:
2026-05-16T19:32:00Z UTC
Hits:
~10
Detections:
not-a-virus:HEUR:AdWare.Win32.Neoreklami.pef not-a-virus:AdWare.Win32.Neoreklami.sb
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Adware.Neoreklami
Status:
Malicious
First seen:
2026-05-15 00:45:50 UTC
File Type:
PE (Exe)
AV detection:
17 of 24 (70.83%)
Threat level:
  1/5
Gathering data
Unpacked files
SH256 hash:
a3030da80aa5f0d4696f47aeaaf4e32884f1b5addc0102ee0050a6efeac96574
MD5 hash:
27bb839db93a5ffefa949415ed7ff4cd
SHA1 hash:
6adbf0f6c074b9d74e40b20fec00cd4acb88ae47
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Reference:https://cyfare.net/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe a3030da80aa5f0d4696f47aeaaf4e32884f1b5addc0102ee0050a6efeac96574

(this sample)

  
Dropped by
Adware.DownloadAssistant
  
Delivery method
Distributed via web download

Comments