MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0a2b96c9168f6e7a43a3278e4220cab546e263a4d1b6f469df0f938dac80c3b8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



KoiLoader


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 0a2b96c9168f6e7a43a3278e4220cab546e263a4d1b6f469df0f938dac80c3b8
SHA3-384 hash: 92da8e1905d91b2d6e96144410de8112d7cac0a773854a300e52506ec4f5e782a05044918cc05ed9956ff531d66b08b9
SHA1 hash: fc49886d6ba94041142692d8ce8fbb785ecdcd57
MD5 hash: aec4ed9c8430a1d085c58d64f946ae09
humanhash: whiskey-glucose-network-network
File name:pororocage.js
Download: download sample
Signature KoiLoader
File size:1'146 bytes
First seen:2024-06-04 06:59:43 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 24:iJF0EC+Czzf5j1IsVL+kUbgIbeQARsZX71PyvMiKMKM:ESEP8Vj6sVCRMKh3ZmMvZM
TLSH T1342141520878EF8D46003689587EE96E8631730673D2F2F77428D685B720551848992A
Reporter JAMESWT_WT
Tags:45-154-204-97 js KoiLoader shalom-pt

Intelligence


File Origin
# of uploads :
1
# of downloads :
338
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
95.7%
Tags:
Banker Encryption Execution Pshelldldr Dexter
Result
Verdict:
MALICIOUS
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
72 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Behaviour
Behavior Graph:
Threat name:
Script-JS.Trojan.Acsogenixx
Status:
Malicious
First seen:
2024-06-04 06:54:29 UTC
File Type:
Text (JavaScript)
AV detection:
17 of 38 (44.74%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Command and Scripting Interpreter: PowerShell
Enumerates physical storage devices
Checks computer location settings
Blocklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments