MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3f9abffd3050fea4494ea58d6c15b4fcd1a0430cd3c7d9c8f633379a70f16417. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 3f9abffd3050fea4494ea58d6c15b4fcd1a0430cd3c7d9c8f633379a70f16417
SHA3-384 hash: 010a9afcf716976b07d159270a6619cf1c78ee70d70e24434a95acb581a48b7709bc741e0f5c1d98090ab87f6ad45096
SHA1 hash: dfd5a2206238602bd6273a851760ce9bb8e401c7
MD5 hash: 7cf9e5365d7cdcf0f44dafffbd088d3c
humanhash: texas-california-eight-nevada
File name:9d8fds9f9dsf9f9398gf98h9f9g8h9h8349899h9fg9h8989589945988f9g8h98f9hg99h89f8hf9g8h989.hta
Download: download sample
File size:72'780 bytes
First seen:2025-11-20 15:23:56 UTC
Last seen:Never
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 192:BpMhCQ0hRSk2SlF1pchRF4WULhKhfChkhlD2Wyaz0Jw6y:oop6tIFYzF4bI9CCHD2s6y
TLSH T1966308C2119FD206AE8B15D14FB2363DA843CECA1B5DA7858DC6211FFB082A5957CE1F
Magika html
Reporter juroots
Tags:hta

Intelligence


File Origin
# of uploads :
1
# of downloads :
39
Origin country :
IL IL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
obfuscate xtreme spawn
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 obfuscated powershell
Verdict:
Malicious
File Type:
hta
First seen:
2025-11-19T09:54:00Z UTC
Last seen:
2025-11-22T10:18:00Z UTC
Hits:
~100
Verdict:
inconclusive
YARA:
2 match(es)
Tags:
Html
Verdict:
Malicious
Threat:
Trojan-Downloader.JS.SLoad
Threat name:
Script-JS.Trojan.Xloader
Status:
Malicious
First seen:
2025-11-19 12:54:49 UTC
File Type:
Binary
AV detection:
7 of 36 (19.44%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Checks computer location settings
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Malware Config
Dropper Extraction:
https://archive.org/download/optimized_msi_20251119/optimized_MSI.png
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

HTML Application (hta) hta 3f9abffd3050fea4494ea58d6c15b4fcd1a0430cd3c7d9c8f633379a70f16417

(this sample)

  
Delivery method
Distributed via web download

Comments