MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ed1aa2813bb7e717028acc6f58be015c70a42cef2f9061e84e883a4e6c30cd78. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: ed1aa2813bb7e717028acc6f58be015c70a42cef2f9061e84e883a4e6c30cd78
SHA3-384 hash: 0ed40c03c08611b5048ac2ca84d707373c7c6a010a5989b6eaa88870333910b307f7479e31dfc68908942850ab4cdd7c
SHA1 hash: 2e91655e5b51880efffa3ca48920aeaf480f0f19
MD5 hash: 658c4c121d942d940da15f4ec8d4f930
humanhash: oscar-mockingbird-carolina-hawaii
File name:DungeonWarriorDemo.zip
Download: download sample
File size:43'356'856 bytes
First seen:2025-12-10 13:15:52 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 786432:epYhcUkZGloUyfbl2lYLxsSCBf/8yl3W/1PdUa3fn4SY502I/F1oHuTNDEEHOHm:e2h8GSUyW20dWNPr2ePoHupQEim
TLSH T1589733BC4BA131C8FF43DA5D574CF4DAFAF5A381E125944A2C51CF86A088EE359B48B1
Magika zip
Reporter burger
Tags:file-pumped stealer zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
128
Origin country :
NL NL
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:DungeonWarriorDemo.exe
Pumped file This file is pumped. MalwareBazaar has de-pumped it.
File size:127'701'166 bytes
SHA256 hash: 85b7cd7d15f0c4c0d036bf131a9623eeff6de5571301b22274e176d18f6398e7
MD5 hash: 1e1cdc123ff9a40ce68f6396e9874638
De-pumped file size:53'208'064 bytes (Vs. original size of 127'701'166 bytes)
De-pumped SHA256 hash: 68f788cb6e558945fa7428a927a8368c72632860ddfc6ee882d2e30295ff4fd4
De-pumped MD5 hash: 6b8fa29aba14b1ea79a4ae3b18f39a28
MIME type:application/x-dosexec
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
expand lolbin microsoft_visual_cc overlay packed pkg
Gathering data
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Checks processor information in registry
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

zip ed1aa2813bb7e717028acc6f58be015c70a42cef2f9061e84e883a4e6c30cd78

(this sample)

Comments