MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2032e0154841e2d847c2b61e45fefc6a6d5c7d46d3b6a411758ea6b6f6c8a3a9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 2032e0154841e2d847c2b61e45fefc6a6d5c7d46d3b6a411758ea6b6f6c8a3a9
SHA3-384 hash: ff32054c1c8ccf556bf2dc813db4cde10c34b8d130db515af87171ed91b4c583bb7db233d78f29890ec2e4120bcd5174
SHA1 hash: ba3f028c48c0538b0084787205538dc46378fada
MD5 hash: bcfb2b31057b65b702d39a0c108b45c2
humanhash: steak-ack-ten-three
File name:dc1.ps1
Download: download sample
File size:91'968 bytes
First seen:2026-01-13 17:01:46 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 1536:a2/CZ9rgErQLz4xfhSAsxbQWSmERqMXuMFKa0Q7NBrEKijxOaRRFg4cnpAOtdW0O:aQvk5ITyW6qalFKa0mHClzRRxcrNMT
TLSH T1CC931275EE306652CB140837119DAB7D5AC1F3E0C18E4F7EAA9A3ACA02DA605DD034DC
Magika powershell
Reporter BlinkzSec
Tags:AES ps1 xor

Intelligence


File Origin
# of uploads :
1
# of downloads :
46
Origin country :
US US
Vendor Threat Intelligence
No detections
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated
Result
Gathering data
Gathering data
Result
Malware family:
n/a
Score:
  3/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PowerShell (PS) ps1 2032e0154841e2d847c2b61e45fefc6a6d5c7d46d3b6a411758ea6b6f6c8a3a9

(this sample)

  
Delivery method
Distributed via web download

Comments