MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ebce322282a51d1010217733cc3a98f07add3e86913d91118bb5854cdd5d0dfc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: ebce322282a51d1010217733cc3a98f07add3e86913d91118bb5854cdd5d0dfc
SHA3-384 hash: 22e19fde45f4a0adbd43d33d1464780b0887cbf89e746262fa33d4b250eab435a7f5c04aef8fd1912ebcad57e34589ad
SHA1 hash: afad7b1411eb1ddbc9ff8bae86aadc1f82c70818
MD5 hash: dcd12f4c2e7c8222ee989b65f4fa4dd0
humanhash: carbon-venus-diet-massachusetts
File name:Luckyware-main.zip
Download: download sample
File size:38'172'309 bytes
First seen:2026-02-28 12:45:56 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 786432:UBYz9q6Ds6hCO8IAZ7cztFFaloHzXpETGBK5URHCN7Q8M5WvzffjB/YoP:UEc+lCLIQCtFFal6Zd4URiNvM5Wvzfff
TLSH T118873304B1865FB2CB315AB92A864710E3B903A6E159F067FF15633C5BC94E72F1F24A
Magika zip
Reporter sysroot
Tags:luckyware RAT Source Code zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
64
Origin country :
PL PL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
70%
Tags:
infosteal
Result
Verdict:
MALICIOUS
Details
Base64 Encoded URL
Detected an ANSI or UNICODE http:// or https:// base64 encoded URL prefix.
Gathering data
Threat name:
Win32.Adware.Generic
Status:
Suspicious
First seen:
2026-02-28 12:47:04 UTC
File Type:
Binary (Archive)
Extracted files:
2776
AV detection:
9 of 24 (37.50%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
execution
Behaviour
Command and Scripting Interpreter: JavaScript
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Multiple

Comments