MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a84843210d3c942aa91cd253af3dae945d7e0524a3a44cbf39c644894f4898da. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: a84843210d3c942aa91cd253af3dae945d7e0524a3a44cbf39c644894f4898da
SHA3-384 hash: 5a098b58a91017eb57f5df7241405fcb54a8b8ce928ddc715b4581de8f0b2e6fd244db487457e18147fcfaa982593dea
SHA1 hash: 28f5cf81f96cc82cb79df1e8b152393c333c7a1b
MD5 hash: 947c46a74b1ae48a5ca7020a29290d2d
humanhash: august-nineteen-winner-lemon
File name:test.zip
Download: download sample
File size:179'228 bytes
First seen:2023-09-22 16:57:20 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 3072:8ebAUy+EjHThtMYiFJ+1uMWDwZQKgVWyNEUvYl89OGziT:bbALjzUYhWDrWyNPwliHzO
TLSH T1F10413F1ECBD4F48CD873581D4678716475CBB88E69929822F96E2849189CF07BC0EB7
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter JAMESWT_WT
Tags:46-151-24-25-8000 CVE-2023-38831 zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
95
Origin country :
IT IT
File Archive Information

This file archive contains 2 file(s), sorted by their relevance:

File name:CLASSIFIED_DOCUMENTS.pdf .cmd
File size:447 bytes
SHA256 hash: a40d8718c45126c155e41298ccc56883f7a46719516d1960a5cdacacbc3c98d4
MD5 hash: 522636049b62b30017b4c46a53d547dc
MIME type:text/plain
File name:CLASSIFIED_DOCUMENTS.pdf
File size:184'292 bytes
SHA256 hash: b1674191a88ec5cdd733e4240a81803105dc412d6c6708d53ab94fc248f4f553
MD5 hash: d56d71ecadf2137be09d8b1d35c6c042
MIME type:application/pdf
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2023-09-22 15:27:04 UTC
File Type:
Binary (Archive)
Extracted files:
25
AV detection:
6 of 35 (17.14%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:WinRAR_CVE_2023_38831_Exploit
Author:marcin@ulikowski.pl
Description:Detects ZIP archives exploiting CVE-2023-38831 in WinRAR
Reference:https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

zip a84843210d3c942aa91cd253af3dae945d7e0524a3a44cbf39c644894f4898da

(this sample)

  
Delivery method
Distributed via web download

Comments