MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d1dcf56483289f41882bcc4f80e63ea12452167658abe3e2900fada782889c14. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA 72 File information Comments

SHA256 hash: d1dcf56483289f41882bcc4f80e63ea12452167658abe3e2900fada782889c14
SHA3-384 hash: 9c856bcef7d3278469420e4480b258e2edfe18d7cc78ce646e7a0d03d0fbd1252635299b726143e3ed3f7a895e24df0a
SHA1 hash: eace3eebf0550f66347a5ca5fad511b940009cfd
MD5 hash: c0f4a5f90c2be3c6cc3b19d301c57539
humanhash: utah-tango-two-blossom
File name:21-02_New Purchase order.zip
Download: download sample
File size:5'980'448 bytes
First seen:2025-02-21 14:47:47 UTC
Last seen:2025-02-21 16:41:39 UTC
File type: zip
MIME type:application/zip
ssdeep 98304:fA3SBlchcu686YJ4WvrKAPpvbk8IVt7XNlof+QvXRIVZMLJClpUoNC0T53E2pPYp:fACEhRgWDvP+d19uPyVZuAlpU8D9pwUy
TLSH T1A3563368AF8BF60CE657C7B4D7C037FB98A306F2D9634640893051DA54A0F9DB6E205B
Magika zip
Reporter cocaman
Tags:zip


Avatar
cocaman
Malicious email (T1566.001)
From: "Ryan Smith <ryan@colornets.com.br>" (likely spoofed)
Received: "from tonyhai.com (unknown [160.22.121.154]) "
Date: "21 Feb 2025 08:30:45 -0800"
Subject: "Request _ polivideo.ch : New Purchase Order Inquiry 2/21/2025 4:30:41 p.m."
Attachment: "21-02_New Purchase order.zip"

Intelligence


File Origin
# of uploads :
2
# of downloads :
434
Origin country :
CH CH
File Archive Information

This file archive contains 12 file(s), sorted by their relevance:

File name:vcruntime140_1.dll
File size:49'528 bytes
SHA256 hash: cbc9eae0fd0d734c7676c6ca36a2346d28d6d0dea856c8a7416b348a75dd6d7a
MD5 hash: a8988e053dfe3faf786bab4eeb4ea413
MIME type:application/x-dosexec
File name:msvcp140_2.dll
File size:268'184 bytes
SHA256 hash: 3d691399d16d47eb205309e4179691440a945565577335ee68d07e6d18fbe615
MD5 hash: 1dc7bb056da8cd5d4a68dd35d9303a49
MIME type:application/x-dosexec
File name:pgodb140.dll
File size:87'432 bytes
SHA256 hash: a3af63ff098307d4d2b1d2310fa188a24ac0c29521807388d5fa89062b4df3a2
MD5 hash: 6094957c7f334f548cd431f803f21474
MIME type:application/x-dosexec
File name:msvcp140_1.dll
File size:35'704 bytes
SHA256 hash: 9bcc3a31d944bcd05a75a4a84eff5f491e2eb0d0f704760af5a56908bc5f7e24
MD5 hash: e89b3a0fa6ccea76ef67bb5cc75a1590
MIME type:application/x-dosexec
File name:msvcp140_codecvt_ids.dll
File size:31'640 bytes
SHA256 hash: e63b47bd633fa9d6cf97690d92f477fdf8d919d248bd26e07a2eb6ea0a433585
MD5 hash: a9235c686569f660e44f4fe401a3de80
MIME type:application/x-dosexec
File name:vcruntime140.dll
File size:109'432 bytes
SHA256 hash: 1f7399374dcbcfda501deab1fb513dd608fef00ae84476b988d008bd0debe193
MD5 hash: cbaba44138f07392e007c0b35932ee19
MIME type:application/x-dosexec
File name:msvcp140_atomic_wait.dll
File size:50'072 bytes
SHA256 hash: 23b0af2a89e7a8b7f0d5fc6eba8660dd3df3ae0c913ae1c690e815ae1d92a344
MD5 hash: 6e1cb23100c786e8e786b30c963dd799
MIME type:application/x-dosexec
File name:mspdbcore.dll
File size:781'752 bytes
SHA256 hash: 4ff86b58727762bcb581ad8e170b495339603eb3c97047f0d6b97f184cc6be9f
MD5 hash: 29d9a948294163913b0b2b580d7c2301
MIME type:application/x-dosexec
File name:tbbmalloc.dll
File size:10'885'120 bytes
SHA256 hash: 5c69ccc5d0dc6a4a61ad7a352643e13a87a07245f894570d70de00260cfa62d4
MD5 hash: 451de0b9a0d15dd781241cecf98775d1
MIME type:application/x-dosexec
File name:#Purchase Order 738493_9302849.exe
File size:59'448 bytes
SHA256 hash: fc49b29334729d33f86ad504e8ba2c04e9bf72627a1ddb6f595be05f21144652
MD5 hash: 0105cc81ddaa1606bfe0d24f81434c14
MIME type:application/x-dosexec
File name:msvcp140.dll
File size:575'360 bytes
SHA256 hash: 5ff150653127fdfa4e07f2795dc46c75a07f914d1d49bb518fb39d77cf36c046
MD5 hash: cb468d0e8f8a8dd19ce1c75b923f1d07
MIME type:application/x-dosexec
File name:msvcdis140.dll
File size:1'463'744 bytes
SHA256 hash: 75c4d9a137073dd1641b670e374cd21517286d09f4eeb2bbb050e8a6ffe97927
MD5 hash: 907cf8b2eb5875fe2dc99f707e9c4951
MIME type:application/x-dosexec
Vendor Threat Intelligence
Verdict:
Unknown
Threat level:
n/a  -.1/10
Confidence:
100%
Tags:
crypto hacktool microsoft_visual_cc obfuscated signed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win64.Trojan.Zmutzy
Status:
Malicious
First seen:
2025-02-21 14:47:51 UTC
File Type:
Binary (Archive)
Extracted files:
13
AV detection:
8 of 38 (21.05%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__MemoryWorkingSet
Author:Fernando Mercês
Description:Anti-debug process memory working set size check
Reference:http://www.gironsec.com/blog/2015/06/anti-debugger-trick-quicky/
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:NET
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:reverse_http
Author:CD_R0M_
Description:Identify strings with http reversed (ptth)
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Suspicious_Latam_MSI_and_ZIP_Files
Author:eremit4, P4nd3m1cb0y
Description:Detects suspicious .msi and .zip files used in Latam banking trojan campaigns.
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:test_Malaysia
Author:rectifyq
Description:Detects file containing malaysia string
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

zip d1dcf56483289f41882bcc4f80e63ea12452167658abe3e2900fada782889c14

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments