MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 54ff2c52ed5e69934031a02b43ff8369ec9f12f148fa7b95c2fec6c2dd719de0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 1


Intelligence 1 IOCs YARA File information Comments

SHA256 hash: 54ff2c52ed5e69934031a02b43ff8369ec9f12f148fa7b95c2fec6c2dd719de0
SHA3-384 hash: 34b6c03de67f7dcbad59f8eb225f7391d2e9d1da7605e06aef23f460dfb0557e5fc308025561169bd1d6aaadb1f205ea
SHA1 hash: 527a45d8bec96686172fb51cd6bc0e68158ec718
MD5 hash: c466a4c42097483b01107ea0fb49360a
humanhash: nineteen-paris-social-utah
File name:ikrs.pdf
Download: download sample
File size:31 bytes
First seen:2025-12-10 16:39:59 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 3:N8FV5AlcBDn:2R8c1
TLSH TNULL
Magika txt
Reporter monitorsg
Tags:ps1 SmartApeSG


Avatar
monitorsg
hXXps://cpajoliette[.]com/d.js (injected) --> hXXps://kuliboku[.]com/sick/network.js --> hXXps://kuliboku[.]com/sick/thread.php --> hXXps://kuliboku[.]com/sick/factory.js (clickfix) --> 91[.]193.19.108:79 (finger) --> hXXp://oipolfield[.]com/ikrs.pdf

Intelligence


File Origin
# of uploads :
1
# of downloads :
56
Origin country :
US US
Vendor Threat Intelligence
No detections
Gathering data
Gathering data
Result
Malware family:
n/a
Score:
  3/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PowerShell (PS) ps1 54ff2c52ed5e69934031a02b43ff8369ec9f12f148fa7b95c2fec6c2dd719de0

(this sample)

  
Delivery method
Distributed via web download

Comments