MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e0bae5f12e5333dc886385242eb7d9dd0760cd78d7c69a0ddebbbf05924b9e8b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Vidar


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: e0bae5f12e5333dc886385242eb7d9dd0760cd78d7c69a0ddebbbf05924b9e8b
SHA3-384 hash: 3f5d9e722cfef1cdfd51eb37aff55e43ccc3c11e0b3519214aa73abf666b254171b17f7c4490b402eb06d5d975156118
SHA1 hash: 853bca504fe7102b8b52db49c737bf838e0e8f2b
MD5 hash: 74956bee02b687d2dd7ce92c0111cfc5
humanhash: tennis-sweet-glucose-beer
File name:SETUP.zip
Download: download sample
Signature Vidar
File size:1'835'467 bytes
First seen:2025-10-13 18:14:52 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 49152:6pIkgi9BXKPkQqcfQGR4pYkeAYJrXdW3z7wVB:6Ckz9B6NBfQdYkWXdI7k
TLSH T189851221FE74441EE888E0B12B613D71C6642F50E9306C72EB749DE46FC6F0D8BAD5A6
Magika zip
Reporter aachum
Tags:AutoIT CypherIT file-pumped vidar zip


Avatar
iamaachum
https://fulllatestss.onl/ => https://mega.nz/file/Oo5FDC6J#dp8qTfiTgCFXgIoIM2vIUBnGCohOrjDsaT7s22wGmg0

Vidar C2:
https://tre.m.astrum.vu/
https://telegram.me/cholars
https://steamcommunity.com/profiles/76561198780612393
https://pre.cozygardenkids.com/
https://pre.sofyartist.com/

Intelligence


File Origin
# of uploads :
1
# of downloads :
105
Origin country :
ES ES
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:setup.exe
Pumped file This file is pumped. MalwareBazaar has de-pumped it.
File size:105'906'213 bytes
SHA256 hash: cd2b3fda674aa6d8fb8fae5b54d80118d192e2fefb2fb3db457768b7bffd47ec
MD5 hash: 4086f575f8a3a97ee4892dc71c004ea3
De-pumped file size:1'496'576 bytes (Vs. original size of 105'906'213 bytes)
De-pumped SHA256 hash: ac7e72b933f7bf58de3b55850db000387ba166a4c4a55781ea95e2bd631f9029
De-pumped MD5 hash: 7a981e99583a013a2a12c1a63867fe1a
MIME type:application/x-dosexec
Signature Vidar
Vendor Threat Intelligence
Verdict:
Malicious
Score:
81.4%
Tags:
shell spawn sage
Result
Verdict:
Malicious
File Type:
ZIP File - Malicious
Behaviour
SuspiciousEmbeddedObjects detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
bloated CAB installer lolbin microsoft_visual_cc overlay overlay packed rundll32 runonce
Verdict:
Malicious
File Type:
zip
First seen:
2025-10-12T19:42:00Z UTC
Last seen:
2025-10-14T00:28:00Z UTC
Hits:
~10
Verdict:
Malware
YARA:
4 match(es)
Tags:
AutoIt CVE-2019-13232 CVE-2019-9674 CVE-2022-29225 CVE-2022-36114 CVE-2023-46104 CVE-2024-0450 Executable Malicious PDB Path PE (Portable Executable) PE File Layout Zip Archive Zip Bomb
Threat name:
Win32.Trojan.Kepavll
Status:
Malicious
First seen:
2025-10-13 00:40:53 UTC
File Type:
Binary (Archive)
Extracted files:
33
AV detection:
10 of 38 (26.32%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Script
Author:@bartblaze
Description:Identifies AutoIT script. This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:detect_Redline_Stealer
Author:Varp0s

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Vidar

zip e0bae5f12e5333dc886385242eb7d9dd0760cd78d7c69a0ddebbbf05924b9e8b

(this sample)

Comments