MalwareBazaar Database

This page shows some basic information the YARA rule TelegramAPIMalware_PowerShell_EXE including corresponding malware samples.

Database Entry


YARA Rule:TelegramAPIMalware_PowerShell_EXE
Author:@polygonben
Description:Hunting for pwsh malware using Telegram for C2
Firstseen:2025-10-22 15:30:08 UTC
Lastseen:2025-11-20 18:56:09 UTC
Sightings:167

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter