MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c06e06820b32b395e0d34787a865fc9abed80a72c4734a0561dde0bb4ec1901a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 18 File information Comments

SHA256 hash: c06e06820b32b395e0d34787a865fc9abed80a72c4734a0561dde0bb4ec1901a
SHA3-384 hash: f8712050de9e718b2b2c2a6cb28108c51665f562b9afc05edf98dfb7572d63b8a0780e31e11ab68959698773a38ec3f1
SHA1 hash: a9434235d32b7d3aae78aef5b530266a9de16a9d
MD5 hash: aa4596e4bb9e9c187e93f4950acf4769
humanhash: double-hamper-undress-twelve
File name:photo20251206898.zip
Download: download sample
File size:172'211 bytes
First seen:2025-12-30 12:15:18 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 3072:2p/LiX8b62c/CVTiL6b0PEBm+5IRDg4vOuue5jeNeuQLko/62hG60UJcTQsmnqY+:4/LZgCTAW+gf0DFyMSbMP54UcQ6l7
TLSH T125F312A615B811B25843F2BB9D712581613CED9A863786FEF3C864F035B44B0DB79C8E
Magika zip
Reporter JAMESWT_WT
Tags:APT-Q-27 zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
99
Origin country :
IT IT
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:photo20251206898m.exe
File size:322'040 bytes
SHA256 hash: 5118f59ff6e3a48aafc7251646c80cb9cc718ffc610744739fa44e4f5bb0a9d2
MD5 hash: 15c94d7fc6ff83e06daa551e155bbb21
MIME type:application/x-dosexec
Vendor Threat Intelligence
Verdict:
Malicious
Score:
92.5%
Tags:
injection virus remo
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
.Net Executable Managed .NET PE (Portable Executable) PE File Layout SOS: 0.69 Zip Archive
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2025-12-06 21:31:43 UTC
File Type:
Binary (Archive)
Extracted files:
3
AV detection:
12 of 36 (33.33%)
Threat level:
  5/5
Gathering data
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments