MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c7393eaf64b44fbbc0b8ee7f9f20ea95d4892d56c9aa876c247e7250c0bc6e03. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 8 File information Comments

SHA256 hash: c7393eaf64b44fbbc0b8ee7f9f20ea95d4892d56c9aa876c247e7250c0bc6e03
SHA3-384 hash: 1d2ce66371d1d2f64aa3886ded3b5941e2604fc3add4145ae55f1c7b7bc5f3a6207d83a4bddb5d7ae2ac3299ab0e1195
SHA1 hash: 741df0239731cc3a6c605e49c984950d728b38db
MD5 hash: 7a42446b5c5deb9228a7b4c762445987
humanhash: football-cold-pennsylvania-jersey
File name:release.zip
Download: download sample
File size:1'726'953 bytes
First seen:2023-10-24 18:40:25 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 24576:wYoNclG6Vi1rVm9zlPTnSSOm5Cz2RELgIr5fPMKG7xl0vNoT3E1QxaB:eEGtto9hbSSOm0CRELRNngxgNoz2QU
TLSH T1798533233969F9FF91CAE464D3469D0236686AF09E4347A00CDA3619B64CF79612FF1C
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter Anonymous
Tags:zip


Avatar
Anonymous
Retrieved from https://m.crep.vip/release.zip
Related URL https://m.crep.vip/packages/ransomware.zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
117
Origin country :
HU HU
File Archive Information

This file archive contains 2 file(s), sorted by their relevance:

File name:mtk.exe
File size:4'325'888 bytes
SHA256 hash: 732551a1d5097426140ce31fae1be56a76a8e4e1fe7f3f8f881541fb75f0df0a
MD5 hash: 70c30480eb06b0183743d108788a2f2c
MIME type:application/x-dosexec
File name:mtk.exe.manifest
File size:337 bytes
SHA256 hash: 3bcc4d687f2eff26675b326c899267fe1679e03192ecdb1646eda523c44d7103
MD5 hash: 989167b05ef6f902a9b0758179c968d6
MIME type:text/plain
Vendor Threat Intelligence
Verdict:
No Threat
Threat level:
  2.5/10
Confidence:
100%
Tags:
anti-debug greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:reverse_http
Author:CD_R0M_
Description:Identify strings with http reversed (ptth)
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:Rustyloader_mem_loose
Author:James_inthe_box
Description:Corroded buerloader
Reference:https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

zip c7393eaf64b44fbbc0b8ee7f9f20ea95d4892d56c9aa876c247e7250c0bc6e03

(this sample)

  
Delivery method
Distributed via web download

Comments