MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4ac0ba433a543bb556cdd4f0411951326570ddd28360bd6e8f448db4b5116955. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: 4ac0ba433a543bb556cdd4f0411951326570ddd28360bd6e8f448db4b5116955
SHA3-384 hash: 4a4b09ccd89ff2f67d2fa28b2df0a4c0469b21645a2ab59f4f8472fe03d38ebbfac1fa96b5363919eecdfedb928f8381
SHA1 hash: 710abe4532d4b6336c7b27bfe9bad47075c5ef9e
MD5 hash: ad935dce98a21e7904e99964dc138d59
humanhash: moon-mars-colorado-jig
File name:4ac0ba433a543bb556cdd4f0411951326570ddd28360bd6e8f448db4b5116955.ps1
Download: download sample
File size:16'826 bytes
First seen:2026-03-31 07:07:55 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 384:XdNCiTvCCK45Kxk6YjUEzIsVIajPV+cr6J:nTCow+6wz5jN+0I
TLSH T19172D0C4C129A16B8394C321BF4CCD4D4610992570AAAE87B2ADD2F3B26F647A8CD855
Magika powershell
Reporter JAMESWT_WT
Tags:hui228-ru ps1

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
IT IT
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
Score:
94.9%
Tags:
phishing shell sage remo
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
base64 meterpreter obfuscated
Verdict:
Malicious
File Type:
ps1
First seen:
2026-03-31T04:22:00Z UTC
Last seen:
2026-03-31T05:03:00Z UTC
Hits:
~10
Detections:
Trojan-Downloader.Win32.Paph.b PDM:Trojan.Win32.Generic
Verdict:
Malware
YARA:
1 match(es)
Tags:
Base64 Block Contains Base64 Block DeObfuscated PowerShell
Threat name:
Script-PowerShell.Backdoor.Meterpreter
Status:
Malicious
First seen:
2026-03-31 07:08:23 UTC
File Type:
Text (PowerShell)
AV detection:
6 of 23 (26.09%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
defense_evasion execution persistence privilege_escalation
Behaviour
Modifies data under HKEY_USERS
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Event Triggered Execution: Netsh Helper DLL
Hide Artifacts: Ignore Process Interrupts
Drops file in System32 directory
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Modifies Windows Firewall
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:SUSP_PowerShell_Base64_Decode
Author:SECUINFRA Falcon Team
Description:Detects PowerShell code to decode Base64 data. This can yield many FP
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments