MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 eb936b1860bcd03a9ecece8002d817445cf5fe8009dca599eeaabba1410f70ed. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 19 File information Comments

SHA256 hash: eb936b1860bcd03a9ecece8002d817445cf5fe8009dca599eeaabba1410f70ed
SHA3-384 hash: 365c5e7d0a15621bc3ee4e0ac7bf0d3864cc9cb75817b9ec51f28b36f575efefc47ed46dadea54d3abb30a5971a04bb1
SHA1 hash: 14db30396475f7f11d46c24cf37cb9ec962719e0
MD5 hash: 117fc83608d993eef98def04e90df522
humanhash: eleven-nebraska-emma-mississippi
File name:Kiddions lavi loader.zip
Download: download sample
File size:69'202'140 bytes
First seen:2026-03-17 18:23:36 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 1572864:huE+2u2kV1524QsqXRlkh3Gnn4kZNBluc6+4iEFVGlxzx3Bo:YE+2u2kVz2ce2Unn3V6+4ikGlxzdW
TLSH T1B2E73392EAFC897F7027116DA5E2D4AFC965B1BC47B319AFC0477180444AAC8DF64C8E
Magika zip
Reporter tcains1
Tags:file-pumped zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
50
Origin country :
US US
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Kiddions Menu.exe
Pumped file This file is pumped. MalwareBazaar has de-pumped it.
File size:173'418'400 bytes
SHA256 hash: d7518e8f5e06f50971878d5cf3a3acba62b335549b1ef76434e1a036f65839f5
MD5 hash: 38fa90dfb619c428769d7dd22dcd4580
De-pumped file size:9'968'640 bytes (Vs. original size of 173'418'400 bytes)
De-pumped SHA256 hash: 1353a7505ed7f2cebb49b1b184dd50eeffdd28f973362e0c065556eaa5f660a1
De-pumped MD5 hash: e5e29b802d8b50cf32001ae0ab5a796a
MIME type:application/x-dosexec
Vendor Threat Intelligence
Verdict:
Malicious
Score:
81.4%
Tags:
virus spawn msil
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug base64 dotnet fingerprint installer-heuristic lolbin microsoft_visual_cc obfuscated overlay privilege soft-404
Gathering data
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Any_SU_Domain
Author:you
Description:Detect any reference to .su domains or subdomains
Rule name:Check_OutputDebugStringA_iat
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__MemoryWorkingSet
Author:Fernando Mercês
Description:Anti-debug process memory working set size check
Reference:http://www.gironsec.com/blog/2015/06/anti-debugger-trick-quicky/
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Detect_Credit_Card_Form
Author:NCSC-CH / GovCERT
Description:Detects credit card submission forms in HTML content
Rule name:Detect_Submitting
Author:NCSC-CH / GovCERT
Description:Detects login forms in HTML content
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:reverse_http
Author:CD_R0M_
Description:Identify strings with http reversed (ptth)
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:telebot_framework
Author:vietdx.mb
Rule name:test_Malaysia
Author:rectifyq
Description:Detects file containing malaysia string
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

zip eb936b1860bcd03a9ecece8002d817445cf5fe8009dca599eeaabba1410f70ed

(this sample)

  
Delivery method
Distributed via web download

Comments