MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d36aa8dd142f9645600c964fe134d907130ee5f001b09a8fa135145670ffa5d6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA 10 File information Comments

SHA256 hash: d36aa8dd142f9645600c964fe134d907130ee5f001b09a8fa135145670ffa5d6
SHA3-384 hash: 000f86bbba87c3eeb9a22c28f83c36d11606b7e2ec6a163d70b7f20a35260a51d04424804021365331225665973f4946
SHA1 hash: 462738f0ea21b2fe8018c220a2d290a01feee032
MD5 hash: f703183fd3a7d0d0d72150dcd3b02583
humanhash: ceiling-sad-paris-colorado
File name:AllegatoRocco.zip
Download: download sample
File size:80'002 bytes
First seen:2025-12-23 22:15:50 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 1536:FyYzOWSdvltxlqhd9JsauHM4iisVauAIvTsJLMF4E6:ZSWSBLxyrJWMBJvwJIFH6
TLSH T17873BE24CABF10B9DEC9FF7F5193E6616B11625B2E606D343FF0A38A1DB5520842C94E
Magika zip
Reporter smica83
Tags:zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
120
Origin country :
HU HU
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:accusa.lnk
File size:79'832 bytes
SHA256 hash: 47d402d737a9c4af4260926157f8dfc66066f5becbff74885ec586e4cd0ae773
MD5 hash: 123b3bd746f1c889826a443143d1f004
MIME type:application/octet-stream
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
dropper virus shell
Result
Verdict:
Malicious
File Type:
LNK File - Malicious
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
autorun cmd evasive forfiles lolbin masquerade wscript
Verdict:
Malicious
File Type:
zip
First seen:
2025-12-19T05:13:00Z UTC
Last seen:
2025-12-19T05:28:00Z UTC
Hits:
~10
Verdict:
Malware
YARA:
4 match(es)
Tags:
Execution: CMD in LNK LNK LOLBin LOLBin:cmd.exe Malicious T1059.003 T1202: Indirect Command Execution T1204.002 Zip Archive
Threat name:
Win32.Trojan.Suschil
Status:
Malicious
First seen:
2025-12-18 18:18:25 UTC
File Type:
Binary (Archive)
Extracted files:
2
AV detection:
11 of 24 (45.83%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Archive_in_LNK
Author:@bartblaze
Description:Identifies archive (compressed) files in shortcut (LNK) files.
Rule name:Execution_in_LNK
Author:@bartblaze
Description:Identifies execution artefacts in shortcut (LNK) files.
Rule name:Find_Emotoet_LNK_File_VBS
Author:David Ledbetter
Description:Search for lnk files dropping vbs files.
Rule name:LNK_sospechosos
Author:Germán Fernández
Description:Detecta archivos .lnk sospechosos
Rule name:Script_in_LNK
Author:@bartblaze
Description:Identifies scripting artefacts in shortcut (LNK) files.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments