MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fc79dfcb1effc5bbc730f93a5273db8c83540dfd8fb27fbca8f95b496e7e4e87. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 2 File information Comments

SHA256 hash: fc79dfcb1effc5bbc730f93a5273db8c83540dfd8fb27fbca8f95b496e7e4e87
SHA3-384 hash: ab631b8b33d3dc1e000c7993eaf00f4758e4f07d77e08227ef6d7e44639b6e9cc09cac2be5235477c214c48ac24b3eb7
SHA1 hash: 1377e4cf5674eeb709b593917ba79f5c31c530a6
MD5 hash: 11622d4949f9812041a425a08f6cfe21
humanhash: autumn-fanta-tango-nevada
File name:MarioKartWIN64.zip
Download: download sample
File size:108'201 bytes
First seen:2024-08-30 21:29:33 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 3072:GBfTg4qhUv+0v3o5Ob8xpiAQFS1Qb4dAViMHihuxt:mf0Nem0v3oVSdzVi2z
TLSH T1FDB31213E48E76D3CE5C7FC59A1C634C1F8A68F9DB418929ED217DB0B98082B99634C7
Magika zip
Reporter Anonymous
Tags:zip


Avatar
Anonymous
Retrieved from https://itsthepartything.serv00.net/repo2/MarioKartWIN64.zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
94
Origin country :
HU HU
File Archive Information

This file archive contains 2 file(s), sorted by their relevance:

File name:Mario Kart Rom Downloader.EXE
File size:196'608 bytes
SHA256 hash: 3c50ca6505fb838b767f46cf7363771e56d51dd2fa00c34b2e8a813a4f5ad6aa
MD5 hash: c0e1cf4fa1805675967c6c16617dafee
MIME type:application/x-dosexec
File name:Readme.txt
File size:61 bytes
SHA256 hash: cd74031990ee20f29e77ec902b4543464b5f30a25c53a19dc663eb3961f29c8e
MD5 hash: 20bdf4943ce80295815efe155dd949c4
MIME type:text/plain
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
Banker Execution Generic Network Static Stealth Dexter
Result
Verdict:
Suspicious
File Type:
PE File
Behaviour
BlacklistAPI detected
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.ForkBomb
Status:
Malicious
First seen:
2024-08-30 21:30:04 UTC
File Type:
Binary (Archive)
Extracted files:
39
AV detection:
2 of 38 (5.26%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

zip fc79dfcb1effc5bbc730f93a5273db8c83540dfd8fb27fbca8f95b496e7e4e87

(this sample)

  
Delivery method
Distributed via web download

Comments