MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 16f331e6c7c5ec95bdd763d83516bb540e84aa165416a63861c9b3dd523a1905. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 16f331e6c7c5ec95bdd763d83516bb540e84aa165416a63861c9b3dd523a1905
SHA3-384 hash: 5b4ce11f5d41506b1f8ff9be90a2475978f7883587039e5fbafec64bb9b65a9361e29356478145804e9f8420e0d49fc0
SHA1 hash: 73b58faf19cf7ab24890d402dd0845fb86a06150
MD5 hash: 74bd0ec6cfda518912e048ca3069e5ae
humanhash: floor-butter-vegan-potato
File name:payment.js
Download: download sample
File size:1'177'671 bytes
First seen:2026-02-16 15:08:09 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 96:XjTzuYI0Ukx15UyNIGQlabcvxxhZ8z2z20Wo303vnWwLRGXNwMVu0HOTGe9D6IYi:XjXuYL9H7wmiB248KejtSDC
Threatray 418 similar samples on MalwareBazaar
TLSH T1D845127C52639CDA0DDA78758ED476CCE7109B23E0FF4EA17884CDA6929035C84F8B99
Magika javascript
Reporter James_inthe_box
Tags:exe js

Intelligence


File Origin
# of uploads :
1
# of downloads :
120
Origin country :
US US
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
95.7%
Tags:
obfuscate xtreme virus
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm base64 base64 fingerprint masquerade obfuscated obfuscated opendir overlay powershell repaired
Verdict:
Malicious
File Type:
js
Detections:
Trojan.JS.SAgent.sb HEUR:Trojan.Script.Generic
Verdict:
inconclusive
YARA:
1 match(es)
Threat name:
Win32.Trojan.Znyonm
Status:
Malicious
First seen:
2026-02-16 11:18:52 UTC
AV detection:
7 of 24 (29.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: JavaScript
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Process spawned unexpected child process
Malware Config
Dropper Extraction:
https://ia600603.us.archive.org/13/items/msi-pro-with-b-64_202602/MSI_PRO_with_b64.png
Malware family:
PhantomStealer
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments