MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 478aed491279bc953ecee8cc7edc569d25c6bd386057f0bbf78486eae9c76275. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



KongTuke


Vendor detections: 8


Intelligence 8 IOCs YARA 2 File information Comments

SHA256 hash: 478aed491279bc953ecee8cc7edc569d25c6bd386057f0bbf78486eae9c76275
SHA3-384 hash: ecb502a1016aa52619b0f147c12550b43922f5d88dd94db5266c65503222852da63c9ada5a49d7ddaeb42fee886f8b4d
SHA1 hash: 0fd63b4dbab755da4efcee6400d3079df95b9eb5
MD5 hash: 5900a0aa9ed9443fbc73ebfba5de0ab3
humanhash: comet-rugby-bravo-chicken
File name:captcha@144.31.169.1
Download: download sample
Signature KongTuke
File size:4'881 bytes
First seen:2026-02-03 13:05:58 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 48:CzwM8GS0KOqpe4x4GSawYmGSaaZKtmGSanl4GSaaq5KkCR5GSapz5ZGSaai:CN1Bt0zWooW1l35PC2feT
TLSH T1A1A1620763E72FFB9A4A4DE95398620724F6C0BB38117A7DF7E515937426A41BC31234
Magika powershell
Reporter monitorsg
Tags:Kongtuke ps1


Avatar
monitorsg
hXXps://monseftq[.]com/5f7b.js --> hXXps://monseftq[.]com/js.php (ClickFix) --> (finger)://144[.]31.169.1:79/captcha

Intelligence


File Origin
# of uploads :
1
# of downloads :
60
Origin country :
US US
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
93.3%
Tags:
obfuscate xtreme shell
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
obfuscated powershell powershell soft-404
Verdict:
Malicious
Labled as:
PowerShell/Runner.X suspicious application
Verdict:
Malicious
File Type:
ps1
First seen:
2026-02-03T13:59:00Z UTC
Last seen:
2026-02-03T14:14:00Z UTC
Hits:
~10
Verdict:
inconclusive
YARA:
1 match(es)
Tags:
PowerShell
Threat name:
Script-PowerShell.Trojan.Heuristic
Status:
Malicious
First seen:
2026-02-03 19:18:32 UTC
File Type:
Text (Batch)
AV detection:
4 of 24 (16.67%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:WIN_FileFix_Detection
Author:dogsafetyforeverone
Description:Detects FileFix social engineering technique that launches chained PowerShell and PHP commands from file explorer typed paths
Reference:FileFix social engineering with PowerShell and PHP commands

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

KongTuke

PowerShell (PS) ps1 478aed491279bc953ecee8cc7edc569d25c6bd386057f0bbf78486eae9c76275

(this sample)

  
Delivery method
Distributed via web download

Comments