MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e1abed5ed12dc8dcab70d3feec4206e5e82c77dc14dbd893368d1521383d47f2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 5 File information Comments

SHA256 hash: e1abed5ed12dc8dcab70d3feec4206e5e82c77dc14dbd893368d1521383d47f2
SHA3-384 hash: 7865ab6d33ab4a6a80145c8aace0b610e7eaa6d1e28fedd49a9448855c85180a78269cfe79c9c482eb66660a1a048dbb
SHA1 hash: 8fcc0f498e899e79607066223213eae22a39cccf
MD5 hash: 4f349b1e6449f3ce9babd63c55b3c89d
humanhash: bakerloo-robin-venus-enemy
File name:FRA-ZCIN56.zip
Download: download sample
File size:1'757 bytes
First seen:2026-04-15 14:09:28 UTC
Last seen:2026-04-15 14:10:07 UTC
File type: zip
MIME type:application/zip
ssdeep 48:9KSoHatyphkP24jsenC86CE0V8LEwGJED2eY5bJtsEXs:8Snyd4IeCRGGXGJE6eY9JtsEc
TLSH T13F31E6616B6B89EAC80E3C37563B6138C0A0C6443850FB539739986BB28C5093F0EEE4
Magika zip
Reporter smica83
Tags:zip

Intelligence


File Origin
# of uploads :
2
# of downloads :
139
Origin country :
HU HU
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:FRA-ZCIN56.lnk
File size:2'153 bytes
SHA256 hash: 68259a5472d07584abc3aa2bc9879da78ce858b765818723e565993aa1cb37bf
MD5 hash: 33d156dc12310797382a283ca739c369
MIME type:application/octet-stream
Vendor Threat Intelligence
Verdict:
Malicious
Score:
91.7%
Tags:
xtreme shell sage
Result
Verdict:
Malicious
File Type:
LNK File - Malicious
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
lolbin mole msiexec
Verdict:
Malicious
File Type:
zip
First seen:
2026-04-15T15:24:00Z UTC
Last seen:
2026-04-15T15:42:00Z UTC
Hits:
~10
Gathering data
Threat name:
Shortcut.Trojan.Mole
Status:
Malicious
First seen:
2026-04-15 08:56:48 UTC
AV detection:
8 of 38 (21.05%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
defense_evasion discovery execution persistence privilege_escalation spyware stealer trojan
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Event Triggered Execution: Installer Packages
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Badlisted process makes network request
Checks whether UAC is enabled
Enumerates connected drives
Looks up external IP address via web service
Network Share Discovery
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Use of msiexec (install) with remote resource
Downloads MZ/PE file
Looks for VMWare Tools registry key
Enumerates VirtualBox registry keys
Looks for VirtualBox Guest Additions in registry
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Download_in_LNK
Author:@bartblaze
Description:Identifies download artefacts in shortcut (LNK) files.
Rule name:Execution_in_LNK
Author:@bartblaze
Description:Identifies execution artefacts in shortcut (LNK) files.
Rule name:SUSP_LNK_CMD
Author:SECUINFRA Falcon Team
Description:Detects the reference to cmd.exe inside an lnk file, which is suspicious
Rule name:SUSP_ZIP_LNK_PhishAttachment
Author:ignacior
Description:Detects suspicius tiny ZIP files with malicious lnk files
Reference:Internal Research
Rule name:SUSP_ZIP_LNK_PhishAttachment_Pattern_Jun22_1
Author:Florian Roth (Nextron Systems)
Description:Detects suspicious tiny ZIP files with phishing attachment characteristics
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments