MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aeb6c843ee38c043a99ad5a080a9676bc452a2733a4bb9f5678e692359a51b56. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 7 File information Comments

SHA256 hash: aeb6c843ee38c043a99ad5a080a9676bc452a2733a4bb9f5678e692359a51b56
SHA3-384 hash: 4f232adf22f7d98b0bfc8b248380783a2e8b892afaa5f06379b0e923c0fdb5a5e1a21b8d9f954feca9198db87f536fe7
SHA1 hash: 1cded0fc0542e869e6e56813c355ec25fe28efc6
MD5 hash: 86c7bef3d2aa0cbaafa27bb8772b5c7f
humanhash: single-india-lion-batman
File name:plugins.zip
Download: download sample
File size:140'621 bytes
First seen:2026-03-19 15:25:27 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 3072:34PyihsW7uTSI7KL5WI/rD/3SCjhLiSDfs94NaFcKAD:jW7OSXUWrD/3SCjh/E94NaF+D
TLSH T18AD3139DF8A529254D827022C4B314CEEBF3BA6151315A30C1EB64A3BBC1D174FF52AE
Magika zip
Reporter smica83
Tags:zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
157
Origin country :
HU HU
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:7zip.exe
File size:282'112 bytes
SHA256 hash: 7452a5746343540a9f170028c6c44ed5fd19361739fd8fcf265f658ac60a775a
MD5 hash: 7bf5bcd1bf675562ccdb39be9cd36a44
MIME type:application/x-dosexec
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.2%
Tags:
virus
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug microsoft_visual_cc
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:SUSP_XORed_URL_In_EXE
Author:Florian Roth (Nextron Systems)
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834
Rule name:SUSP_XORed_URL_in_EXE_RID2E46
Author:Florian Roth
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments