MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b2e084a9cab46b01cfa8725c3cc23ef5cc2a4e399d83ff760e4bdb8b028ec6f6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA 1 File information Comments

SHA256 hash: b2e084a9cab46b01cfa8725c3cc23ef5cc2a4e399d83ff760e4bdb8b028ec6f6
SHA3-384 hash: b9519f2445a1b269205ac8645bf2b155bfa7ad92e6f5e678fb805f0ca28002ef691d1271766e72c4792e957e6872d154
SHA1 hash: 61381078ebf1aa3f330f9c565efdf672137e6533
MD5 hash: 3d990b8ad0701283b44edb758c849324
humanhash: johnny-london-apart-oven
File name:nada000
Download: download sample
File size:24'946'416 bytes
First seen:2025-11-18 07:02:01 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 393216:sub7YtHCNJA8J0rxsRoNFGtrpfFGtXgmgnpRmwmD9gIdRvndJs9tp07UchO:sKkhCXA8JY3OhpNGtXgmgLmZxBRPdJoD
TLSH T1E0472313C55E4376DF0BAB7527968B27824CE552B31295973FF423C02863ACA8A5FF06
TrID 52.6% (.WHL) Python Wheel package (25000/1/5)
22.1% (.PYZ) Python Zip Application (10500/1/1)
16.8% (.XPI) Mozilla Firefox browser extension (8000/1/1)
8.4% (.ZIP) ZIP compressed archive (4000/1)
Magika zip
Reporter Brad_malware
Tags:Python zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
64
Origin country :
US US
Vendor Threat Intelligence
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout SVG Zip Archive
Gathering data
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments