MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 12e4bb8ad8eb72a600dac23f23aa360b0be54a87f0a8621109394148b17117c0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 12e4bb8ad8eb72a600dac23f23aa360b0be54a87f0a8621109394148b17117c0
SHA3-384 hash: a81cdbf5297d06ac5fd2168f28fad45a2920b7392f8e4462a827f55948885633787c5412571eea04371816b64d7236d5
SHA1 hash: 133ccf2eb7db80154832edc3a8fd84e5c146ba76
MD5 hash: 5bd29a809f2395a20ff96e8b874810ec
humanhash: cardinal-moon-arizona-cup
File name:ps1002.ps1
Download: download sample
File size:187'396 bytes
First seen:2024-11-19 11:12:08 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 3072:1oz7HtT1pkV+MK8jcuT2tY96Y36BPWbiZMwc1orpI1QBgjLW/eOJbHAe:m/NZuIuStYIW6BPKcHcWrpGybh
TLSH T127048E76C64B7FE64A63484C950C7E84BE9866D7C1A8A646C89CF16736CB030CA7C4F9
Magika powershell
Reporter Joker
Tags:ps1 worm

Intelligence


File Origin
# of uploads :
1
# of downloads :
188
Origin country :
GR GR
Vendor Threat Intelligence
Verdict:
Malicious
Score:
96.5%
Tags:
virus gates worm
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
mimail obfuscated
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1558350 Sample: ps1002.ps1 Startdate: 19/11/2024 Architecture: WINDOWS Score: 48 10 Multi AV Scanner detection for submitted file 2->10 6 powershell.exe 11 2->6         started        process3 process4 8 conhost.exe 6->8         started       
Threat name:
Win32.Worm.Torvil
Status:
Malicious
First seen:
2024-11-15 22:27:23 UTC
File Type:
Text
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PowerShell (PS) ps1 12e4bb8ad8eb72a600dac23f23aa360b0be54a87f0a8621109394148b17117c0

(this sample)

Comments