MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 09ad032c25c6dd4cb498dd0310fd7b0d365b2d3037ab7ee016ee429ecc5e25df. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 09ad032c25c6dd4cb498dd0310fd7b0d365b2d3037ab7ee016ee429ecc5e25df
SHA3-384 hash: 894e8922e6b6973fe91b170acebe5503b149ffc797ec1d20f482d915dfee076c4aaf5f9ca4a154e682491105adf2e5db
SHA1 hash: 4db2256d8a1e6c2e9528e8f4884c6d70ca00de22
MD5 hash: e44325eb7d46629ead7f43b0417a1b08
humanhash: wolfram-jersey-king-four
File name:kaywise22.ps1
Download: download sample
File size:524'300 bytes
First seen:2025-04-11 04:15:59 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 12288:4GG4CFAKZFPvsFigsr2eu32rP4Yg6MCGu6HAGN2WrjZDkEQl94kQ1ZcPBHr:WDAKZFUUg8nbs1EzWr/09moL
TLSH T1C2B42310BFAC5DE40E0CE57960C9FD1C5A68A9B194ACA1AD1EC1BCD7268FB304F46C67
Magika txt
Reporter JAMESWT_WT
Tags:176-65-142-190 ps1

Intelligence


File Origin
# of uploads :
1
# of downloads :
106
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1662767 Sample: kaywise22.ps1 Startdate: 11/04/2025 Architecture: WINDOWS Score: 48 16 Joe Sandbox ML detected suspicious sample 2->16 6 powershell.exe 26 2->6         started        9 svchost.exe 1 1 2->9         started        process3 dnsIp4 18 Loading BitLocker PowerShell Module 6->18 12 conhost.exe 6->12         started        14 127.0.0.1 unknown unknown 9->14 signatures5 process6
Threat name:
Text.Trojan.Generic
Status:
Suspicious
First seen:
2025-04-10 19:13:17 UTC
File Type:
Text
AV detection:
3 of 24 (12.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PowerShell (PS) ps1 09ad032c25c6dd4cb498dd0310fd7b0d365b2d3037ab7ee016ee429ecc5e25df

(this sample)

  
Delivery method
Distributed via web download

Comments