MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 33c17b461e8571f519540c8a3e2e522299afec63c78cecb030304a592dafcffc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 33c17b461e8571f519540c8a3e2e522299afec63c78cecb030304a592dafcffc
SHA3-384 hash: 74fb107a3b6ce802de30f5321ae3b491b372cf5836b337cf295402f1c7a21310e877da732f68c0b489dd8723ce65eaa6
SHA1 hash: bef872b54fdd000cde5ac7df64c762b2b1850c5f
MD5 hash: 117407fda45157ae6f1dd97cb436f7db
humanhash: spaghetti-papa-pennsylvania-ohio
File name:ps1003.ps1
Download: download sample
File size:87'918 bytes
First seen:2024-11-19 11:13:29 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 1536:160OYPDTBV1KIbWl12NeFUS4nlceOVUb0QpyMxki3pQVIRYtTPdLCjydbz:1ZDTBVgWWlw7S2lymQQ8MbqtTP5Cjyd/
TLSH T141830234CE9665DF2B2AC8B5BD92CAEDAC8052434A44E01F1DF9185B3EE5930E7CE471
Magika powershell
Reporter Joker
Tags:malware ps1 worm

Intelligence


File Origin
# of uploads :
1
# of downloads :
201
Origin country :
GR GR
Vendor Threat Intelligence
Verdict:
Malicious
Score:
96.5%
Tags:
virus gates worm
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1558352 Sample: ps1003.ps1 Startdate: 19/11/2024 Architecture: WINDOWS Score: 48 10 Multi AV Scanner detection for submitted file 2->10 6 powershell.exe 11 2->6         started        process3 process4 8 conhost.exe 6->8         started       
Threat name:
Win32.Worm.Torvil
Status:
Malicious
First seen:
2024-11-16 00:34:21 UTC
File Type:
Text
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PowerShell (PS) ps1 33c17b461e8571f519540c8a3e2e522299afec63c78cecb030304a592dafcffc

(this sample)

  
Delivery method
Distributed via web download

Comments