MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1e02b38f1fc636f135a45c04026b7f35f29a57657455813980a437f70eb32c51. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 1e02b38f1fc636f135a45c04026b7f35f29a57657455813980a437f70eb32c51
SHA3-384 hash: e2a43fb16d68e30daabdfdfdcd24ef5413859fa6409612654ef6537e7a82b8067df8bde1449ca63a7a6f5b963bd5ecd0
SHA1 hash: 3644126a401bffd4e0b5f3f2df61619e3c0ed7c0
MD5 hash: 2786212bab805e7b121105dd2c36d83b
humanhash: emma-vegan-seventeen-ceiling
File name:ps.ps1
Download: download sample
File size:48 bytes
First seen:2026-03-17 12:10:27 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 3:VSJJFIqF1F65IFKESX:s8qF1FAh
TLSH TNULL
Magika batch
Reporter JAMESWT_WT
Tags:booking bostcompaq-com ClickFix FakeCaptcha ps1

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
obfuscated powershell
Verdict:
Adware
File Type:
ps1
Detections:
NetTool.PowerShellUA.HTTP.C&C NetTool.PowerShellGet.HTTP.C&C
Gathering data
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: PowerShell
Badlisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments