MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 05d6f4e462065f3c5c3710775f15f96d333ff3d35ea7860536c6208ff4c2f294. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 2 File information Comments

SHA256 hash: 05d6f4e462065f3c5c3710775f15f96d333ff3d35ea7860536c6208ff4c2f294
SHA3-384 hash: 41f812e137befc9d78d8e4a9c5c0aa4a1a663b2b7c8543e2589890d296224775fc2f5c7115cf3bc8531a87351e858580
SHA1 hash: 803ce49d77f3f94d04d7d2aefd26127644889daa
MD5 hash: dfa6b624cbc76b78c0f374d8b324de34
humanhash: shade-spring-green-avocado
File name:file
Download: download sample
File size:1'824 bytes
First seen:2026-03-06 17:10:09 UTC
Last seen:2026-03-06 17:20:37 UTC
File type:unknown
MIME type:text/x-msdos-batch
ssdeep 24:wtOS6O3KfdpBwa2pdu4FOwfjJ396+4ef1jSvJfdA0VCCJlTQfsz8V7PCOwfjJ39z:CefpXY3o2jSv/A0v8Ve3s3UDrH
TLSH T14831E02778368210DBE056F89A1D3A61B757834BA701FFC5B3C16197A80B22687F06ED
Magika batch
Reporter Bitsight
Tags:dropped-by-amadey fbf543


Avatar
Bitsight
url: http://158.94.211.222/files/2070717540/IPvJTgG.bat

Intelligence


File Origin
# of uploads :
12
# of downloads :
28
Origin country :
US US
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm asyncrat base64 cmd dropper evasive explorer fingerprint installer installer-heuristic lolbin powershell reconnaissance reg rundll32 runonce schtasks taskkill timeout
Result
Gathering data
Gathering data
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:dgaaga
Author:Harshit
Description:Detects suspicious PowerShell or registry activity
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

unknown 05d6f4e462065f3c5c3710775f15f96d333ff3d35ea7860536c6208ff4c2f294

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

Comments