MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 48e4e03a764edf04b50e01ffae551cc0b1bb07a6116d82851d3d76769b00d4be. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 48e4e03a764edf04b50e01ffae551cc0b1bb07a6116d82851d3d76769b00d4be
SHA3-384 hash: d1ebed0db03ac8fc77b33b89bd56a9bc5f819c851b9be6fa97d45137e169e551edacb048c80cc579e81833239c62df58
SHA1 hash: cbcb7d3849349de0f8d87f1f3d38814cd2ba4d4e
MD5 hash: 481d833f5b9f4b8e0c477d2ab5b65014
humanhash: muppet-illinois-spaghetti-speaker
File name:KKAMobf1g5oQXJmd.js
Download: download sample
File size:375'276 bytes
First seen:2026-03-31 10:53:09 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 6144:tQ93T4hAGOt5vsErQkGm8B4fBCtw0GSHYsjKj5eucZ/h7dSWepe8HJ5INKJJ10Wn:e93T4hKPv3skNBCgSHYzbcngWepe8HJX
TLSH T1E7845A0393FA4618F1F34B98AA7A10614E77BEA92D39C05D1699140E1BF3E149CB97F3
TrID 66.6% (.TXT) Text - UTF-16 (LE) encoded (2000/1)
33.3% (.MP3) MP3 audio (1000/1)
Magika vba
Reporter James_inthe_box
Tags:exe js

Intelligence


File Origin
# of uploads :
1
# of downloads :
111
Origin country :
US US
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
Score:
81.4%
Tags:
stration shell virus
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
repaired
Verdict:
Malicious
File Type:
js
First seen:
2026-03-30T06:52:00Z UTC
Last seen:
2026-04-02T09:02:00Z UTC
Hits:
~1000
Detections:
PDM:Trojan.Win32.Generic HEUR:Trojan.Script.Generic
Verdict:
inconclusive
YARA:
1 match(es)
Threat name:
Script.Trojan.Heuristic
Status:
Malicious
First seen:
2026-03-30 09:58:39 UTC
File Type:
Text (JavaScript)
AV detection:
8 of 24 (33.33%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
Command and Scripting Interpreter: PowerShell
Checks computer location settings
Registers new Windows logon scripts automatically executed at logon.
Badlisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments