MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 5457f091c5359a251927a764684f5fed96157b5777350c33bd5b4426927cd498. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 9
| SHA256 hash: | 5457f091c5359a251927a764684f5fed96157b5777350c33bd5b4426927cd498 |
|---|---|
| SHA3-384 hash: | b4cb1a57e6600b98fdfb3475c86fbb8fc6d690cb038e0436f93a455c01b3d3625b927f34410e2467042d32fa2aeea2f6 |
| SHA1 hash: | bf815df10685341882c5ba6b48341d7deccfed53 |
| MD5 hash: | dd8dec5dd17966440792c0d2c1a16fc7 |
| humanhash: | crazy-item-spring-chicken |
| File name: | ps1006.ps1 |
| Download: | download sample |
| File size: | 220 bytes |
| First seen: | 2024-11-19 11:15:56 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | text/plain |
| ssdeep | 6:yy97hKy9p35BLu3q19/m3CVMBOe5fEgZaubuxsn:f91H9pD6C9/mWSOOsrubui |
| TLSH | T130D0A76F861E8094021E51B50E5269F415C52F6184961536E7989D59B59336A0508F11 |
| Magika | powershell |
| Reporter | |
| Tags: | malware ps1 |
Intelligence
File Origin
# of uploads :
1
# of downloads :
86
Origin country :
GRVendor Threat Intelligence
Verdict:
Malicious
Score:
96.5%
Tags:
virus shell gates
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
powershell
Verdict:
Malicious
Labled as:
Trojan.Agent
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
64 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Loading BitLocker PowerShell Module
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Score:
88%
Verdict:
Malware
File Type:
SCRIPT
Threat name:
Script-PowerShell.Trojan.ViperSoftX
Status:
Malicious
First seen:
2024-11-15 22:16:51 UTC
File Type:
Text
AV detection:
19 of 38 (50.00%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
3/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
ps1 5457f091c5359a251927a764684f5fed96157b5777350c33bd5b4426927cd498
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.