MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 44923e3db1b3f55bf5337a1a8db8f19699950c276e480b7ab56408f729a30236. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 44923e3db1b3f55bf5337a1a8db8f19699950c276e480b7ab56408f729a30236
SHA3-384 hash: 71116b61c6820fa78406abb458eccd73a462ae1638635cb6088f6286b64cd4a44e2dd9449c23373a809bb78fb6932359
SHA1 hash: af7377fe1aa51ef2cc8285450ac65c38966b807a
MD5 hash: 677c58481018ffe44345fdd0ccefb9ba
humanhash: lima-white-kentucky-mockingbird
File name:sample.ps1
Download: download sample
File size:1'334 bytes
First seen:2026-02-03 08:08:21 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 24:Mvuu81AkZMwHByfKRmUHszWczQqzejHjkjFiNT1Vm5AjDdf7jDb0Ctw:HueAkZMwhyfKjHe/YHFKA1j3m
TLSH T119215626BD03CE6725D83533DCAD3B88E4E5EC0950E7DA86B3F4D08C40CD45A929F16A
Magika powershell
Reporter Anonymous
Tags:powershell ps1

Intelligence


File Origin
# of uploads :
1
# of downloads :
61
Origin country :
QA QA
Vendor Threat Intelligence
No detections
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
powershell
Verdict:
Suspicious
Labled as:
PowerShell/TrojanDownloader.Agent
Verdict:
Malicious
File Type:
ps1
Detections:
UDS:DangerousObject.Multi.Generic
Gathering data
Result
Malware family:
n/a
Score:
  10/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: PowerShell
Badlisted process makes network request
Malware Config
Dropper Extraction:
https://res.cloudinary.com/dxxyxpqxg/image/upload/v1769767854/MSI_PRO_with_b64_qjojsf.jpg
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments