Security News Malicious 7-Zip site distributes installer laced with proxy tool

Parkinsond

Level 56
Thread author
Verified
Well-known
Dec 6, 2023
4,531
11,848
5,469
A fake 7-Zip website is distributing a trojanized installer of the popular archiving tool that turns the user’s computer into a residential proxy node.
Residential proxy networks use home user devices to route traffic with the goal of evading blocks and performing various malicious activities such as credential stuffing, phishing, and malware distribution.

The new campaign became better known after a user reported that they downloaded a malicious installer from a website impersonating the 7-Zip project while following instructions in a YouTube tutorial on building a PC system. BleepingComputer can confirm that the malicious website, 7zip[.]com, is still live.

The website is blocked by uBOL and ControlD DNS (hagezi tif); it's detected on VT by only two vendors.
Capture.JPG
Capture2.JPG
Capture3.JPG

The attacker copied the text and mimicked the structure of the original 7-Zip website located at 7-zip.org.
The installer file was analyzed by researchers at cybersecurity company Malwarebytes, who found that it is digitally signed with a now-revoked certificate originally issued to Jozeal Network Technology Co., Limited.

The malicious copy also contains the 7-Zip program, thus providing the regular functions of the tool. However, the installer drops three malicious files:
  1. Uphero.exe – service manager and update loader
  2. hero.exe – main proxy payload
  3. hero.dll – support library

 
Technical Analysis & Remediation

MITRE ATT&CK Mapping

T1036.005 (Masquerading: Match Legitimate Name or Location
) Mimicking 7-zip.org content and structure.

T1543.003 (Create or Modify System Process: Windows Service) Creates an auto-start service running as SYSTEM.

T1090 (Proxy)
Routes external traffic through the victim's host.

T1497 (Virtualization/Sandbox Evasion)
Checks for VMware, VirtualBox, QEMU, and Parallels.

CVE Profile
[N/A] (Social Engineering / Trojan)

Telemetry & IOCs

Distribution Domain

7zip[.]com (Do NOT visit).

C2/Exfiltration Domain
iplogger[.]org.

File System Artifacts

C:\Windows\SysWOW64\hero\Uphero.exe


C:\Windows\SysWOW64\hero\hero.exe


C:\Windows\SysWOW64\hero\hero.dll

Network Activity

Outbound connections on non-standard ports 1000 and 1002.

DNS-over-HTTPS (DoH) via Google resolvers.

Certificates: "Jozeal Network Technology Co., Limited".

Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)

GOVERN (GV)

Command

Update Software Procurement Policy to explicitly whitelist 7-zip.org and blacklist 7zip[.]com.

DETECT (DE)

Command

Configure EDR to alert on process creation of Uphero.exe or hero.exe originating from SysWOW64.

Command
Query network logs for traffic to iplogger[.]org or high-frequency outbound connections on ports 1000/1002.

RESPOND (RS)

Command

Isolate affected endpoints.

Command
Terminate the associated Windows Service (SYSTEM privileges).

Command
Review firewall modifications; the malware uses netsh to modify rules.

RECOVER (RC)

Command

Re-image compromised hosts (recommended due to SYSTEM level persistence).

IDENTIFY & PROTECT (ID/PR)

Command

Implement DNS filtering to block newly registered domains or known proxyware C2s.

Remediation - THE HOME USER TRACK (Safety Focus)

Priority 1: Safety

Command

Disconnect from the internet immediately. The malware turns your PC into a proxy for potentially illegal activities.

Priority 2: Eradication

Command

Boot into Safe Mode.

Command
Navigate to C:\Windows\SysWOW64\ and check for a folder named hero. If found, this confirms infection.

Command
Run a full scan with a reputable non-resident antivirus (e.g., Microsoft Defender Offline or Malwarebytes Free) to remove the service and files.

Priority 3: Persistence

Command

Check your firewall settings for unauthorized allowed programs. The malware modifies these rules to allow traffic.

Hardening & References

Source of Truth

Always download 7-Zip from the official repository: 7-zip.org.

Warning
Avoid clicking download links in YouTube tutorials or promoted search results.

Source

BleepingComputer (Original Report)

Official 7-Zip Repository
Note: This is the only valid source. All others should be blocked at the network perimeter.
 
That's the OFFICIAL installer file, first submitted in August 2025😎. The original researcher's publication didn't include the malware installer's hash, but the proxy's binaries are already all detected by MD.

ps: I can confirm the malware site currently redirects the download link to the official installation link. That's SNEAKY.
 
Last edited:
That's the OFFICIAL installer file, first submitted in August 2025😎. The original researcher's publication didn't include the malware installer's hash, but the proxy's binaries are already all detected by MD.

ps: I can confirm the malware site currently redirects the download link to the official installation link. That's SNEAKY.
Did you run the installer to get certain no dropped files exist?
I have no VM, so I could not do.
 
capture_02112026_093751.jpg
ps: I can confirm the malware site currently redirects the download link to the official installation link. That's SNEAKY.
Indeed, it will appear legitimate in submitted reports and next reports will be delayed or regarded as a false positive.
 
Did you run the installer to get certain no dropped files exist?
The link I saw pointed to the file on 7-zip.org, having the same hash as the one you posted and the one I installed in August. I do not have the proxy on my system.

I am still not yet paranoid enough to think files with the same SHA-256 hash are different files, so for the sake of my sanity, please don't get me started 🤪.
 
I recommend it, but you are of course free not to follow my advice; it won't make any difference to me.
In my opinion, you should use HaGeZi Multi Ultimate.

You assume that TIFF is better, but in general this is not the case.
The first list has more coverage.
For a while, I combined ControlD DNS (hagezi tif) with hagezi ultimate mini list in uBO; the blocking was indentical.
 
  • Like
Reactions: Sorrento
The link I saw pointed to the file on 7-zip.org, having the same hash as the one you posted and the one I installed in August. I do not have the proxy on my system.

I am still not yet paranoid enough to think files with the same SHA-256 hash are different files, so for the sake of my sanity, please don't get me started 🤪.
This website does not represent a challenge for me as I strictly download installers from the official websites.
It's just a chance to evaluate web protection by variable tools (DNS protection, AV web protection, and adblocker web protection).
 
This website does not represent a challenge for me
According to ScamAdvisors, the following websites redirect to the proper 7-zip.org:

Code:
7zip.org, 7-zip.com, 7-z.org, 1.7777.gr, www.7-zip.com, www.7-z.org, www.7zip.org, 7-zip.org, 7-zip.org

The malware website URL (7zip[.]com) by itself doesn't present any suspicious signs. It has been registered almost as long as 7-zip.org itself. It doesn't expire until 2030. This is rather unusual for a scam/malware site. These guys seem to be playing a LONG game.

I am putting the URL on my block list just to make sure.
 
This is an interesting twist. I just tried to download the newly published 26.00 7-zip manager (from 7-Zip), which failed because of "Trojan:Win32/Wacatac.H!ml" detection, also reported on the Eleven forum.

Event[0]:
Time Created : xxx
ProviderName : Microsoft-Windows-Windows Defender
Id : 1116
Message : Microsoft Defender Antivirus has detected malware or other potentially unwanted software.
For more information please see the following:
Trojan:Win32/Wacatac.H!ml threat description - Microsoft Security Intelligence
Name: Trojan:Win32/Wacatac.H!ml
ID: 2147814523
Severity: Severe
Category: Trojan
Path: file:xxx\7-ZIP manager 7z2600-x64.exe
Detection Origin: Local machine
Detection Type: FastPath
Detection Source: Real-Time Protection
User: xxx
Process Name: C:\Program Files\Everything\Everything.exe
Security intelligence Version: AV: 1.445.12.0, AS: 1.445.12.0, NIS: 1.445.12.0
Engine Version: AM: 1.1.26010.1, NIS: 1.1.26010.1

Apparent VT report: VirusTotal 6fe18d5b3080e39678cabfa6cef12cfb25086377389b803a36a3c43236a8a82c
Announcement + discussion on sourceforge: 7-Zip / Discussion / Open Discussion: 7-Zip 26.00
 
Last edited:
This is an interesting twist. I just tried to download the newly published 26.00 7-zip manager (from 7-Zip), which failed because of "Trojan:Win32/Wacatac.H!ml" detection, also reported on the Eleven forum.

Event[0]:
Time Created : xxx
ProviderName : Microsoft-Windows-Windows Defender
Id : 1116
Message : Microsoft Defender Antivirus has detected malware or other potentially unwanted software.
For more information please see the following:
Trojan:Win32/Wacatac.H!ml threat description - Microsoft Security Intelligence
Name: Trojan:Win32/Wacatac.H!ml
ID: 2147814523
Severity: Severe
Category: Trojan
Path: file:xxx\7-ZIP manager 7z2600-x64.exe
Detection Origin: Local machine
Detection Type: FastPath
Detection Source: Real-Time Protection
User: xxx
Process Name: C:\Program Files\Everything\Everything.exe
Security intelligence Version: AV: 1.445.12.0, AS: 1.445.12.0, NIS: 1.445.12.0
Engine Version: AM: 1.1.26010.1, NIS: 1.1.26010.1
I have tried too now; that is what I have got

{0260359C-9C2F-4BC8-9766-BF271259DAB5}.png
Capture.JPG
Capture.JPG
 
Last edited by a moderator: