MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 eff814665d2add26030b1717c8d2b5501d9f8d0fe6e147b289c70d8646acea28. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA 8 File information Comments

SHA256 hash: eff814665d2add26030b1717c8d2b5501d9f8d0fe6e147b289c70d8646acea28
SHA3-384 hash: 37ec881a44f3e3057c4558105e7105d0c5fc0540d963af71e12c14fc7276428e5d25f0e7ec72fd56b8e80746a631247e
SHA1 hash: 2988d3da41d1570ecccb84271a526ed8110c41fa
MD5 hash: d67f3eb6d7d331867554b7fea806efd6
humanhash: utah-winter-west-victor
File name:Dokumen_cukai.zip
Download: download sample
File size:1'667'538 bytes
First seen:2026-03-16 14:31:16 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 49152:DQGZI/MtQ6Gzib7f4LlGECZihTfOi9mEW:pZWjze74BGFshzOi9mX
TLSH T1C57533ED2A8CF497FE5B1B687BB31625965880276D22CFDF9DEB44031CA0814EC758C6
Magika zip
Reporter smica83
Tags:zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
75
Origin country :
HU HU
File Archive Information

This file archive contains 6 file(s), sorted by their relevance:

File name:v.exe
File size:1'342'632 bytes
SHA256 hash: 09923d7bf4d4314003ad086dae8ce89b93ae25ca74589e5886a709a37b619573
MD5 hash: 4deeae6777404a647e54fed7d9f28224
MIME type:application/x-dosexec
File name:libsmartscreenn.dll
File size:105'984 bytes
SHA256 hash: 5973eb911f7bee7f90d940c08d32bd441d386bf6913fbbe2a7279b07ef68889f
MD5 hash: f642b48ed43d09e00e0e8a9a655263b0
MIME type:application/x-dosexec
File name:work.bin
File size:113'854 bytes
SHA256 hash: e196cfc38811c446d830b96402878d94d3d75e49978b1e18af8987934df72b0d
MD5 hash: fd44fef1f79cfac4bb275db3026dd043
MIME type:application/octet-stream
File name:vvsh.bin
File size:1'480 bytes
SHA256 hash: 187e3658ef6bb7cb424aa93a46b40debc767b69212b1978a2dce3f066f63f3b9
MD5 hash: 23498e11312f2f168fa20c97b8151bcd
MIME type:application/octet-stream
File name:AppInstaller.exe
File size:2'649'656 bytes
SHA256 hash: e67659cec3aaac0edc4fb12ac80da5bfb0ab8a104f6cdfd96c62db475bc96e6b
MD5 hash: 3e9982144ade383386792119b130a37c
MIME type:application/x-dosexec
File name:CO.exe
File size:119'856 bytes
SHA256 hash: 67ef79fb3485188d2e9d7374ae3f8be21d4d675042fa1e81a353c80723406dee
MD5 hash: 87fd3e876829413b8c214bfcc2845cd3
MIME type:application/x-dosexec
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
inconclusive
YARA:
2 match(es)
Tags:
Zip Archive
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2026-03-11 10:38:45 UTC
File Type:
Binary (Archive)
Extracted files:
50
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments