Fake 7-Zip downloads are turning home PCs into proxy nodes
A convincing lookalike of the popular 7-Zip archiver site has been serving a trojanized installer that silently converts victims' machines into residential proxy nodes. The fake site, 7zip[.]com, distributes a functional copy of 7-Zip alongside concealed malware. The malware deploys three components: Uphero.exe (service manager), hero.exe (proxy payload), and hero.dll (supporting library). It establishes persistence through Windows services, manipulates firewall rules, and profiles the host system. The primary function is to enroll infected hosts as residential proxy nodes, allowing third parties to route traffic through victims' IP addresses. This campaign appears to be part of a broader operation with similar tactics used for other fake installers. The malware incorporates multiple evasion techniques and uses encrypted communications.
AI Analysis
Technical Summary
This threat involves a malicious campaign leveraging a lookalike domain (7zip[.]com) impersonating the legitimate 7-Zip archiver site to distribute a trojanized installer. The installer delivers a functional 7-Zip application bundled with concealed malware comprising three main components: Uphero.exe, which acts as a service manager to maintain persistence; hero.exe, the proxy payload that enables the infected machine to function as a residential proxy node; and hero.dll, a supporting dynamic link library. Upon execution, the malware establishes persistence by creating Windows services and modifies firewall rules to allow proxy traffic. It also profiles the host system to gather environment details, likely to optimize proxy operations or evade sandbox detection. The infected machines become part of a proxy network that third parties can use to route traffic, potentially for anonymizing malicious activities such as spam, fraud, or evading geo-restrictions. The malware uses encrypted communications to conceal command and control traffic and employs multiple evasion techniques, including masquerading as legitimate software components and manipulating system configurations. This campaign is part of a broader operation that uses similar tactics with other fake software installers, indicating a scalable and persistent threat actor. Indicators of compromise include specific file hashes and a set of suspicious domains related to the malware's command and control infrastructure. Although no active exploits have been reported, the threat poses significant risks due to its stealth and potential for abuse. The campaign targets Windows systems, primarily home PCs, but could affect organizational endpoints if users download software from untrusted sources.
Potential Impact
For European organizations, the primary impact is indirect but significant. Infected home PCs or organizational endpoints can be co-opted into proxy networks, which can be used by threat actors to anonymize their activities, complicating attribution and incident response. This can lead to reputational damage if an organization's IP addresses are involved in malicious traffic. The malware's persistence and firewall manipulation may degrade system performance and increase network traffic, potentially impacting availability. Additionally, the presence of such malware indicates a lapse in endpoint security hygiene, increasing the risk of further compromise. Residential proxy abuse can also facilitate fraud, spam, or other cybercrimes that may target European businesses or citizens. The stealthy nature of the malware and encrypted communications make detection challenging, increasing dwell time and potential damage. Organizations relying on remote or hybrid work models are particularly vulnerable if employees download software from unofficial sources. The threat also raises privacy concerns due to unauthorized use of IP addresses and potential data leakage through profiling activities.
Mitigation Recommendations
European organizations should implement multi-layered defenses focusing on endpoint security and user education. Specifically, enforce strict software installation policies restricting downloads to verified sources and digitally signed installers. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting suspicious service creation, firewall rule changes, and unusual proxy-related network traffic. Monitor network traffic for anomalous outbound connections to known malicious domains listed in the indicators. Use DNS filtering to block access to lookalike domains such as 7zip[.]com and the associated command and control domains. Conduct regular user awareness training emphasizing risks of downloading software from unofficial sites and recognizing phishing or social engineering attempts. Implement application whitelisting to prevent unauthorized executables from running. Regularly audit firewall and service configurations to detect unauthorized changes. For home users, provide guidance on verifying software authenticity and using official vendor sites. Network segmentation can limit the impact if an endpoint becomes infected. Finally, maintain updated threat intelligence feeds to detect emerging indicators related to this campaign.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
Indicators of Compromise
- hash: c4edf28177e72d1bfc482cf4d05a156b
- hash: ddf75cc7e322d75de77b17c8ec887975
- hash: e2022cedcea9b5ea81764996732a9880
- hash: 01ef636f9627a77ae11af9af88dd52106b163422
- hash: 664e87fe1d01dfe6f03f6027c09fcfa117ffb27e
- hash: aeda326c3653f17120bb0d75738c0bd82e7f7f31
- hash: 3544ffefb2a38bf4faf6181aa4374f4c186d3c2a7b9b059244b65dce8d5688d9
- hash: b7a7013b951c3cea178ece3363e3dd06626b9b98ee27ebfd7c161d0bbcfbd894
- hash: e7291095de78484039fdc82106d191bf41b7469811c4e31b4228227911d25027
- domain: apex.herosms.ai
- domain: flux.smshero.co
- domain: glide.smshero.cc
- domain: mint.smshero.com
- domain: neo.herosms.co
- domain: nova.smshero.ai
- domain: prime.herosms.vip
- domain: pulse.herosms.cc
- domain: soc.hero-sms.co
- domain: spark.herosms.io
- domain: vivid.smshero.vip
- domain: zest.hero-sms.ai
Fake 7-Zip downloads are turning home PCs into proxy nodes
Description
A convincing lookalike of the popular 7-Zip archiver site has been serving a trojanized installer that silently converts victims' machines into residential proxy nodes. The fake site, 7zip[.]com, distributes a functional copy of 7-Zip alongside concealed malware. The malware deploys three components: Uphero.exe (service manager), hero.exe (proxy payload), and hero.dll (supporting library). It establishes persistence through Windows services, manipulates firewall rules, and profiles the host system. The primary function is to enroll infected hosts as residential proxy nodes, allowing third parties to route traffic through victims' IP addresses. This campaign appears to be part of a broader operation with similar tactics used for other fake installers. The malware incorporates multiple evasion techniques and uses encrypted communications.
AI-Powered Analysis
Technical Analysis
This threat involves a malicious campaign leveraging a lookalike domain (7zip[.]com) impersonating the legitimate 7-Zip archiver site to distribute a trojanized installer. The installer delivers a functional 7-Zip application bundled with concealed malware comprising three main components: Uphero.exe, which acts as a service manager to maintain persistence; hero.exe, the proxy payload that enables the infected machine to function as a residential proxy node; and hero.dll, a supporting dynamic link library. Upon execution, the malware establishes persistence by creating Windows services and modifies firewall rules to allow proxy traffic. It also profiles the host system to gather environment details, likely to optimize proxy operations or evade sandbox detection. The infected machines become part of a proxy network that third parties can use to route traffic, potentially for anonymizing malicious activities such as spam, fraud, or evading geo-restrictions. The malware uses encrypted communications to conceal command and control traffic and employs multiple evasion techniques, including masquerading as legitimate software components and manipulating system configurations. This campaign is part of a broader operation that uses similar tactics with other fake software installers, indicating a scalable and persistent threat actor. Indicators of compromise include specific file hashes and a set of suspicious domains related to the malware's command and control infrastructure. Although no active exploits have been reported, the threat poses significant risks due to its stealth and potential for abuse. The campaign targets Windows systems, primarily home PCs, but could affect organizational endpoints if users download software from untrusted sources.
Potential Impact
For European organizations, the primary impact is indirect but significant. Infected home PCs or organizational endpoints can be co-opted into proxy networks, which can be used by threat actors to anonymize their activities, complicating attribution and incident response. This can lead to reputational damage if an organization's IP addresses are involved in malicious traffic. The malware's persistence and firewall manipulation may degrade system performance and increase network traffic, potentially impacting availability. Additionally, the presence of such malware indicates a lapse in endpoint security hygiene, increasing the risk of further compromise. Residential proxy abuse can also facilitate fraud, spam, or other cybercrimes that may target European businesses or citizens. The stealthy nature of the malware and encrypted communications make detection challenging, increasing dwell time and potential damage. Organizations relying on remote or hybrid work models are particularly vulnerable if employees download software from unofficial sources. The threat also raises privacy concerns due to unauthorized use of IP addresses and potential data leakage through profiling activities.
Mitigation Recommendations
European organizations should implement multi-layered defenses focusing on endpoint security and user education. Specifically, enforce strict software installation policies restricting downloads to verified sources and digitally signed installers. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting suspicious service creation, firewall rule changes, and unusual proxy-related network traffic. Monitor network traffic for anomalous outbound connections to known malicious domains listed in the indicators. Use DNS filtering to block access to lookalike domains such as 7zip[.]com and the associated command and control domains. Conduct regular user awareness training emphasizing risks of downloading software from unofficial sites and recognizing phishing or social engineering attempts. Implement application whitelisting to prevent unauthorized executables from running. Regularly audit firewall and service configurations to detect unauthorized changes. For home users, provide guidance on verifying software authenticity and using official vendor sites. Network segmentation can limit the impact if an endpoint becomes infected. Finally, maintain updated threat intelligence feeds to detect emerging indicators related to this campaign.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.malwarebytes.com/blog/threat-intel/2026/02/fake-7-zip-downloads-are-turning-home-pcs-into-proxy-nodes"]
- Adversary
- null
- Pulse Id
- 698d9d85f511c437a687cbad
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hashc4edf28177e72d1bfc482cf4d05a156b | — | |
hashddf75cc7e322d75de77b17c8ec887975 | — | |
hashe2022cedcea9b5ea81764996732a9880 | — | |
hash01ef636f9627a77ae11af9af88dd52106b163422 | — | |
hash664e87fe1d01dfe6f03f6027c09fcfa117ffb27e | — | |
hashaeda326c3653f17120bb0d75738c0bd82e7f7f31 | — | |
hash3544ffefb2a38bf4faf6181aa4374f4c186d3c2a7b9b059244b65dce8d5688d9 | — | |
hashb7a7013b951c3cea178ece3363e3dd06626b9b98ee27ebfd7c161d0bbcfbd894 | — | |
hashe7291095de78484039fdc82106d191bf41b7469811c4e31b4228227911d25027 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainapex.herosms.ai | — | |
domainflux.smshero.co | — | |
domainglide.smshero.cc | — | |
domainmint.smshero.com | — | |
domainneo.herosms.co | — | |
domainnova.smshero.ai | — | |
domainprime.herosms.vip | — | |
domainpulse.herosms.cc | — | |
domainsoc.hero-sms.co | — | |
domainspark.herosms.io | — | |
domainvivid.smshero.vip | — | |
domainzest.hero-sms.ai | — |
Threat ID: 698d9e94c9e1ff5ad8b3631e
Added to database: 2/12/2026, 9:34:12 AM
Last enriched: 2/12/2026, 9:48:47 AM
Last updated: 2/21/2026, 12:21:31 AM
Views: 526
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-02-20
MediumMIMICRAT: ClickFix Campaign Delivers Custom RAT via Compromised Legitimate Websites
MediumAndroid threats using GenAI usher in a new era
MediumMaltrail IOC for 2026-02-20
MediumFBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.