Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Fake 7-Zip downloads are turning home PCs into proxy nodes

0
Medium
Published: Thu Feb 12 2026 (02/12/2026, 09:29:41 UTC)
Source: AlienVault OTX General

Description

A convincing lookalike of the popular 7-Zip archiver site has been serving a trojanized installer that silently converts victims' machines into residential proxy nodes. The fake site, 7zip[.]com, distributes a functional copy of 7-Zip alongside concealed malware. The malware deploys three components: Uphero.exe (service manager), hero.exe (proxy payload), and hero.dll (supporting library). It establishes persistence through Windows services, manipulates firewall rules, and profiles the host system. The primary function is to enroll infected hosts as residential proxy nodes, allowing third parties to route traffic through victims' IP addresses. This campaign appears to be part of a broader operation with similar tactics used for other fake installers. The malware incorporates multiple evasion techniques and uses encrypted communications.

AI-Powered Analysis

AILast updated: 02/12/2026, 09:48:47 UTC

Technical Analysis

This threat involves a malicious campaign leveraging a lookalike domain (7zip[.]com) impersonating the legitimate 7-Zip archiver site to distribute a trojanized installer. The installer delivers a functional 7-Zip application bundled with concealed malware comprising three main components: Uphero.exe, which acts as a service manager to maintain persistence; hero.exe, the proxy payload that enables the infected machine to function as a residential proxy node; and hero.dll, a supporting dynamic link library. Upon execution, the malware establishes persistence by creating Windows services and modifies firewall rules to allow proxy traffic. It also profiles the host system to gather environment details, likely to optimize proxy operations or evade sandbox detection. The infected machines become part of a proxy network that third parties can use to route traffic, potentially for anonymizing malicious activities such as spam, fraud, or evading geo-restrictions. The malware uses encrypted communications to conceal command and control traffic and employs multiple evasion techniques, including masquerading as legitimate software components and manipulating system configurations. This campaign is part of a broader operation that uses similar tactics with other fake software installers, indicating a scalable and persistent threat actor. Indicators of compromise include specific file hashes and a set of suspicious domains related to the malware's command and control infrastructure. Although no active exploits have been reported, the threat poses significant risks due to its stealth and potential for abuse. The campaign targets Windows systems, primarily home PCs, but could affect organizational endpoints if users download software from untrusted sources.

Potential Impact

For European organizations, the primary impact is indirect but significant. Infected home PCs or organizational endpoints can be co-opted into proxy networks, which can be used by threat actors to anonymize their activities, complicating attribution and incident response. This can lead to reputational damage if an organization's IP addresses are involved in malicious traffic. The malware's persistence and firewall manipulation may degrade system performance and increase network traffic, potentially impacting availability. Additionally, the presence of such malware indicates a lapse in endpoint security hygiene, increasing the risk of further compromise. Residential proxy abuse can also facilitate fraud, spam, or other cybercrimes that may target European businesses or citizens. The stealthy nature of the malware and encrypted communications make detection challenging, increasing dwell time and potential damage. Organizations relying on remote or hybrid work models are particularly vulnerable if employees download software from unofficial sources. The threat also raises privacy concerns due to unauthorized use of IP addresses and potential data leakage through profiling activities.

Mitigation Recommendations

European organizations should implement multi-layered defenses focusing on endpoint security and user education. Specifically, enforce strict software installation policies restricting downloads to verified sources and digitally signed installers. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting suspicious service creation, firewall rule changes, and unusual proxy-related network traffic. Monitor network traffic for anomalous outbound connections to known malicious domains listed in the indicators. Use DNS filtering to block access to lookalike domains such as 7zip[.]com and the associated command and control domains. Conduct regular user awareness training emphasizing risks of downloading software from unofficial sites and recognizing phishing or social engineering attempts. Implement application whitelisting to prevent unauthorized executables from running. Regularly audit firewall and service configurations to detect unauthorized changes. For home users, provide guidance on verifying software authenticity and using official vendor sites. Network segmentation can limit the impact if an endpoint becomes infected. Finally, maintain updated threat intelligence feeds to detect emerging indicators related to this campaign.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.malwarebytes.com/blog/threat-intel/2026/02/fake-7-zip-downloads-are-turning-home-pcs-into-proxy-nodes"]
Adversary
null
Pulse Id
698d9d85f511c437a687cbad
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashc4edf28177e72d1bfc482cf4d05a156b
hashddf75cc7e322d75de77b17c8ec887975
hashe2022cedcea9b5ea81764996732a9880
hash01ef636f9627a77ae11af9af88dd52106b163422
hash664e87fe1d01dfe6f03f6027c09fcfa117ffb27e
hashaeda326c3653f17120bb0d75738c0bd82e7f7f31
hash3544ffefb2a38bf4faf6181aa4374f4c186d3c2a7b9b059244b65dce8d5688d9
hashb7a7013b951c3cea178ece3363e3dd06626b9b98ee27ebfd7c161d0bbcfbd894
hashe7291095de78484039fdc82106d191bf41b7469811c4e31b4228227911d25027

Domain

ValueDescriptionCopy
domainapex.herosms.ai
domainflux.smshero.co
domainglide.smshero.cc
domainmint.smshero.com
domainneo.herosms.co
domainnova.smshero.ai
domainprime.herosms.vip
domainpulse.herosms.cc
domainsoc.hero-sms.co
domainspark.herosms.io
domainvivid.smshero.vip
domainzest.hero-sms.ai

Threat ID: 698d9e94c9e1ff5ad8b3631e

Added to database: 2/12/2026, 9:34:12 AM

Last enriched: 2/12/2026, 9:48:47 AM

Last updated: 2/21/2026, 12:21:31 AM

Views: 526

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats