MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 062939637659e6dd7804bd09d184257c53f7cbcec6bab616a1860163c022a46b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 062939637659e6dd7804bd09d184257c53f7cbcec6bab616a1860163c022a46b
SHA3-384 hash: bfae08938d2708eec88017cde9b75cb1a4b855c80b88c41378efd11cfa4ac45c59841d966edd889449f29f86251fd5b8
SHA1 hash: ce718690312b004067512cd5f3b890b9b6c2b51f
MD5 hash: b496cf3c4e34a5ad6aaf92b63ae6fd5a
humanhash: idaho-shade-louisiana-item
File name:baggg..ps1
Download: download sample
File size:327'008 bytes
First seen:2025-04-11 04:15:51 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 6144:rnyL7i9ZMb30Q50JaoD9rDpKY20ieZZJbs/0pw0pwydxRb:L39+LfE1KYxdbVy0Wydjb
TLSH T1F86423257E7B7B79CDC3C359D0117A6A8C924E01118DFB8AD9E8D19EB6AD7C02D22432
Magika txt
Reporter JAMESWT_WT
Tags:176-65-142-190 ps1

Intelligence


File Origin
# of uploads :
1
# of downloads :
98
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1662766 Sample: baggg..ps1 Startdate: 11/04/2025 Architecture: WINDOWS Score: 48 16 Joe Sandbox ML detected suspicious sample 2->16 6 powershell.exe 26 2->6         started        9 svchost.exe 1 1 2->9         started        process3 dnsIp4 18 Loading BitLocker PowerShell Module 6->18 12 conhost.exe 6->12         started        14 127.0.0.1 unknown unknown 9->14 signatures5 process6
Result
Malware family:
n/a
Score:
  3/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PowerShell (PS) ps1 062939637659e6dd7804bd09d184257c53f7cbcec6bab616a1860163c022a46b

(this sample)

  
Delivery method
Distributed via web download

Comments