MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1eba35c9e02246b59aedd4e9b822e2485ccc593bfe67eb714d0cac0bc08bd266. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 1eba35c9e02246b59aedd4e9b822e2485ccc593bfe67eb714d0cac0bc08bd266
SHA3-384 hash: 3fe062ef7cb673e4ed26deccd803f6c45766d857cd2fc6b44dbd5f9aef0c811778b1b1ce4e3746673a20f1f6dcb7a6e3
SHA1 hash: 83a9b0eba73c86af8431ef7844611c6adc097659
MD5 hash: 9c6c01f60725e63ad7b989186e06b588
humanhash: jersey-lion-washington-bluebird
File name:ps.ps1
Download: download sample
File size:1'618 bytes
First seen:2026-04-15 06:29:32 UTC
Last seen:2026-04-15 06:30:19 UTC
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 48:lSdEC+eKIeea05F/yDRTSpRVavH6CVee8F8qint:lt9R4MuHVwH6CVe9w
TLSH T14931AA6315BA05BFDADE30B3D0D24601D4C26EAC40266710F4F8677E454000F6D97DF5
Magika powershell
Reporter JAMESWT_WT
Tags:Dienstangebot-Klement ps1

Intelligence


File Origin
# of uploads :
2
# of downloads :
49
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Gathering data
Result
Malware family:
n/a
Score:
  3/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments