MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 396619b3f50f9f0de1a6ddcf012729e02939927c2234a56c8509e659e3f92b7a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



HijackLoader


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 396619b3f50f9f0de1a6ddcf012729e02939927c2234a56c8509e659e3f92b7a
SHA3-384 hash: 46208222217d2d27652de43a1b726b4d8c393f59ce838f4b1b9871a7489456cc91a4835925e15fa1ecc98078cc8456d2
SHA1 hash: 4820ccf25e8ab2e49ef4bf6dc454225a205a3691
MD5 hash: 2f29dce03245644b619e2c90465aabd5
humanhash: nitrogen-robert-carolina-leopard
File name:J.ps1
Download: download sample
Signature HijackLoader
File size:15'015 bytes
First seen:2025-11-09 17:02:25 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 384:cEiB1NQ59ciDR655NGwmPJf1YclyaJZlQ75YIYpiVVgdW:c+59HpPJN7yaJZk6piVydW
Threatray 33 similar samples on MalwareBazaar
TLSH T1F462C0E24985F4A4C188218F90ED4BFD85B6376510582168F7DB287CB7FD4CC3962F60
Magika powershell
Reporter JAMESWT_WT
Tags:booking HIjackLoader naskkr-com ps1 Spam-ITA

Intelligence


File Origin
# of uploads :
1
# of downloads :
79
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
81.4%
Tags:
shellcode spawn
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated
Verdict:
Clean
File Type:
ps1
First seen:
2025-11-09T14:15:00Z UTC
Last seen:
2025-11-09T14:20:00Z UTC
Hits:
~10
Gathering data
Threat name:
Script-PowerShell.Packed.Generic
Status:
Suspicious
First seen:
2025-11-09 17:02:33 UTC
File Type:
Text
AV detection:
6 of 24 (25.00%)
Threat level:
  1/5
Result
Malware family:
hijackloader
Score:
  10/10
Tags:
family:hijackloader discovery execution loader persistence privilege_escalation spyware stealer
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
Event Triggered Execution: Installer Packages
System Location Discovery: System Language Discovery
Drops file in Windows directory
Suspicious use of SetThreadContext
Enumerates connected drives
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Badlisted process makes network request
Detects HijackLoader (aka IDAT Loader)
HijackLoader
Hijackloader family
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments