{
	"id": "52f7cbd1-0062-45b8-8f80-41172e43e12a",
	"created_at": "2026-04-06T00:09:08.626193Z",
	"updated_at": "2026-04-10T03:20:49.783764Z",
	"deleted_at": null,
	"sha1_hash": "1a10a2ca371efbaa9cc52de23ddc50a24d7fadff",
	"title": "Nov 2012 - W32.Narilam Sample",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 74284,
	"plain_text": "Nov 2012 - W32.Narilam Sample\r\nArchived: 2026-04-05 12:37:28 UTC\r\nNov 2012 - W32.Narilam Sample\r\nEnd of the year presents:\r\nThis is a sample of W32.Narilam \r\nRelated News and Analysis:\r\nNov 2012 (malware is much older but re-surfaced in Nov 2012)\r\nW32.Narilam – Business Database Sabotage\r\nW32.Narilam | Symantec\r\nFile: data.exe_\r\nSize: 1629184\r\nMD5:  8E63C306E95843ECCAB53DAD31B3A98B\r\nhttps://www.virustotal.com/file/cf3c015d828784c7dffcba80619dba4cba970680ea5aa9f42f7356e79643a749/analysis/\r\nSHA256: cf3c015d828784c7dffcba80619dba4cba970680ea5aa9f42f7356e79643a749\r\nSHA1: b7462e83cd81fcbee7b799e230bed19331c9d516\r\nMD5: 8e63c306e95843eccab53dad31b3a98b\r\nFile size: 1.6 MB ( 1629184 bytes )\r\nFile name: Data.exe\r\nFile type: Win32 EXE\r\nTags: peexe\r\nDetection ratio: 32 / 43\r\nAnalysis date: 2012-11-26 12:06:30 UTC ( 1 week, 3 days ago )\r\nhttp://contagiodump.blogspot.com/2012/12/nov-2012-w32narilam-sample.html\r\nPage 1 of 2\n\nAdditional information\r\nBehavioural information\r\nAntivirus Result Update\r\nAgnitum Worm.Agent!nmyuAQJx1Sc 20121125\r\nAhnLab-V3 Trojan/Win32.Scar 20121125\r\nAntiVir TR/Crypt.CFI.Gen 20121126\r\nAvast Win32:Rootkit-gen [Rtk] 20121126\r\nAVG unknown virus Win32/DH{LmQDYmcJDw} 20121126\r\nBitDefender Gen:Variant.Zusy.Elzob.9149 20121126\r\nComodo UnclassifiedMalware 20121126\r\nDrWeb Trojan.Siggen4.39803 20121126\r\nEmsisoft Gen:Variant.Zusy.Elzob.9149 (B) 20121126\r\nESET-NOD32 Win32/Agent.NEN 20121126\r\nF-Secure Gen:Variant.Zusy.Elzob.9149 20121126\r\nFortinet W32/Agent.CB!tr 20121126\r\nGData Gen:Variant.Zusy.Elzob.9149 20121126\r\nIkarus Virus.Win32.Virut 20121126\r\nJiangmin Trojan/Scar.dtc 20121126\r\nK7AntiVirus Riskware 20121124\r\nKaspersky Worm.Win32.Narilam.b 20121126\r\nKingsoft Win32.Troj.Generic_01.k 20121119\r\nMcAfee Generic BackDoor.wc 20121126\r\nMcAfee-GW-Edition Heuristic.LooksLike.Win32.Suspicious.J!86 20121126\r\nMicrosoft Trojan:Win32/Delfsnif.DU 20121126\r\nMicroWorld-eScan - 20121126\r\nNorman W32/Obfuscated.H3!genr 20121126\r\nPanda Trj/Scar.AB 20121125\r\nRising Worm.Win32.VobfusEx.e 20121126\r\nSophos Mal/Banker-CB 20121126\r\nSUPERAntiSpyware Trojan.Agent/Gen-Falint 20121126\r\nSymantec W32.Narilam 20121126\r\nTotalDefense Win32/FakeFLDR_i 20121125\r\nTrendMicro Mal_OtorunN 20121126\r\nTrendMicro-HouseCall Mal_OtorunN 20121126\r\nVBA32 Trojan.FakeFolder.1941 20121124\r\nViRobot Trojan.Win32.A.Scar.1569280\r\nSource: http://contagiodump.blogspot.com/2012/12/nov-2012-w32narilam-sample.html\r\nhttp://contagiodump.blogspot.com/2012/12/nov-2012-w32narilam-sample.html\r\nPage 2 of 2\n\nTags: peexe Detection ratio: 32 / 43   \nAnalysis date: 2012-11-26 12:06:30 UTC ( 1 week, 3 days ago )\n    Page 1 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"http://contagiodump.blogspot.com/2012/12/nov-2012-w32narilam-sample.html"
	],
	"report_names": [
		"nov-2012-w32narilam-sample.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775434148,
	"ts_updated_at": 1775791249,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/1a10a2ca371efbaa9cc52de23ddc50a24d7fadff.pdf",
		"text": "https://archive.orkl.eu/1a10a2ca371efbaa9cc52de23ddc50a24d7fadff.txt",
		"img": "https://archive.orkl.eu/1a10a2ca371efbaa9cc52de23ddc50a24d7fadff.jpg"
	}
}