MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c07e0f01e39ae74667d3014904706b50effd1f3cb75e8130eb57729d38589ad5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA 14 File information Comments

SHA256 hash: c07e0f01e39ae74667d3014904706b50effd1f3cb75e8130eb57729d38589ad5
SHA3-384 hash: 905dfc4e76e3ff651fc438b57856dee90ede71ed572756936dc627fe2a1ff3ab1d8695e7e96d57c93780d769433c4e33
SHA1 hash: f30ef4afe1c0c3f8694d820bf469335d0f2f390d
MD5 hash: 709d70239f1e9441e8e21fcacfdc5d08
humanhash: item-princess-jersey-london
File name:c07e0f01e39ae74667d3014904706b50effd1f3cb75e8130eb57729d38589ad5
Download: download sample
File size:778'120 bytes
First seen:2026-03-01 10:05:50 UTC
Last seen:Never
File type:Shortcut (lnk) lnk
MIME type:application/x-ms-shortcut
ssdeep 12288:+3P6aPT3PhZIBW1kwlwD5D0uvkO4ccskJ1RdIa5UgTzHfGgFvaadXtI9r7dQczNx:baLABW3l9bDU2/GRYWX3z4W
TLSH T160F49DC0CE11D4ABD7B01E37582AF763E75A915AEF3792381C9DE7A0E522151B60883F
Magika lnk
Reporter JAMESWT_WT
Tags:APT37 lnk

Intelligence


File Origin
# of uploads :
1
# of downloads :
71
Origin country :
IT IT
Vendor Threat Intelligence
Malware configuration found for:
LNK
Details
LNK
a command line and any observed urls
Verdict:
Malicious
Score:
99.1%
Tags:
obfuscated shellcode sage
Result
Verdict:
Malicious
File Type:
LNK File - Malicious
Behaviour
BlacklistAPI detected
Result
Gathering data
Verdict:
Malicious
File Type:
lnk
First seen:
2025-12-25T23:16:00Z UTC
Last seen:
2025-12-26T08:00:00Z UTC
Hits:
~10
Gathering data
Threat name:
Shortcut.Trojan.Droid
Status:
Malicious
First seen:
2025-12-27 01:49:58 UTC
File Type:
Binary
Extracted files:
12
AV detection:
18 of 36 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
defense_evasion discovery execution
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Delays execution with timeout.exe
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Archive_in_LNK
Author:@bartblaze
Description:Identifies archive (compressed) files in shortcut (LNK) files.
Rule name:Brooxml_Hunting
Author:Proofpoint
Description:Detects Microsoft OOXML files with prepended data/manipulated header
Reference:https://x.com/threatinsight/status/1861817946508763480
Rule name:detect_powershell
Author:daniyyell
Description:Detects suspicious PowerShell activity related to malware execution
Rule name:Execution_in_LNK
Author:@bartblaze
Description:Identifies execution artefacts in shortcut (LNK) files.
Rule name:High_Entropy_LNK
Author:@bartblaze
Description:Identifies shortcut (LNK) file with equal or higher entropy than 6.5. Most goodware LNK files have a low entropy, lower than 6.
Rule name:Large_filesize_LNK
Author:@bartblaze
Description:Identifies shortcut (LNK) file larger than 100KB. Most goodware LNK files are smaller than 100KB.
Rule name:LNK_sospechosos
Author:Germán Fernández
Description:Detecta archivos .lnk sospechosos
Rule name:meth_peb_parsing
Author:Willi Ballenthin
Rule name:PS_in_LNK
Author:@bartblaze
Description:Identifies PowerShell artefacts in shortcut (LNK) files.
Rule name:Script_in_LNK
Author:@bartblaze
Description:Identifies scripting artefacts in shortcut (LNK) files.
Rule name:SUSP_LNK_Big_Link_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspiciously big LNK file - maybe with embedded content
Reference:Internal Research
Rule name:SUSP_LNK_Big_Link_File_RID2EDD
Author:Florian Roth
Description:Detects a suspiciously big LNK file - maybe with embedded content
Reference:Internal Research
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments