MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7f467084343ca7986a188108390c1de3c98bb211e304cc4bc700125c1ea495f6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gamaredon


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 7f467084343ca7986a188108390c1de3c98bb211e304cc4bc700125c1ea495f6
SHA3-384 hash: d4d1dc3534efec126e3375b405c95485f7ce98dac7c05e29168540bdea4b47b6eb5059c7938aadf4a8fcd9623523486d
SHA1 hash: eb2c18ca27cf1395a5c7eb174c5064357c9106bb
MD5 hash: 8f235f4138a3362a67caee9ff82a4fc4
humanhash: wyoming-december-maine-friend
File name:dropped.ps
Download: download sample
Signature Gamaredon
File size:93'630 bytes
First seen:2025-11-23 15:47:22 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 1536:4Khmo2ewfPpcf1JltcSk5rRKspUiUd9lGneYeOKVq8j1SKg553NqgXh886jh67wG:ElpWJlIaZlGnrGI8j1s553NOh67n
TLSH T17D933B17F80312E4971A7293C2C7228BDEE4C4757A361491F13598AB251BC79EB8FA3D
Magika vba
Reporter M128BitOff
Tags:apt dropper gamaredon powershell ps1


Avatar
M128BitOff
This malware sample was downloaded from Gamaredons Payload Delivery Infrastructure in the following analysis:
https://blog.synapticsystems.de/inside-gamaredon-2025-zero-click-espionage-at-scale/

Intelligence


File Origin
# of uploads :
1
# of downloads :
26
Origin country :
FR FR
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive masquerade obfuscated
Result
Gathering data
Verdict:
Malware
YARA:
1 match(es)
Tags:
adodb.stream msxml2.domdocument.3.0 msxml2.xmlhttp Scripting.FileSystemObject VBScript vbscript.regexp WScript.Shell
Verdict:
Malicious
Threat:
Trojan-Downloader.VBS.SLoad
Threat name:
Script-WScript.Trojan.Gamaredon
Status:
Malicious
First seen:
2025-11-23 16:23:25 UTC
File Type:
Text (VBS)
AV detection:
1 of 36 (2.78%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gamaredon

PowerShell (PS) ps1 7f467084343ca7986a188108390c1de3c98bb211e304cc4bc700125c1ea495f6

(this sample)

  
Delivery method
Distributed via web download

Comments