MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 58ce3719c896c53d7f3404151c0c2f418d390658a97eb3e1d1ed75939a4e2701. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 58ce3719c896c53d7f3404151c0c2f418d390658a97eb3e1d1ed75939a4e2701
SHA3-384 hash: ee1e3a8e5d91b78a508e747475cf62ed2f924bdf2efb183131d35a7d9248fb8f3da2fe880568621a4c8daf55f7989252
SHA1 hash: b330a6217d51cd65b2acf6a93342be6a3c6d073b
MD5 hash: c9cd94e31283e85708ecbcee55b69d76
humanhash: california-ceiling-kansas-cola
File name:vin.bat
Download: download sample
File size:2'579 bytes
First seen:2025-07-07 07:48:14 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/x-msdos-batch
ssdeep 48:Z47L67qKMHJmYu6p0KGFshWE9KGnKGIH50h3dswhXBncK4ruhopUP+7K0hpxx35K:Z47L67LMpfcKfKeKvZ6dsjKqpKUpDX3Q
TLSH T1E4517603164891789DA603AF453E4EB4EA0796D0A291397F21FF70A954436DCE0BF1BF
Magika batch
Reporter JAMESWT_WT
Tags:bat WsgiDAV

Intelligence


File Origin
# of uploads :
1
# of downloads :
25
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
rl_3fd581cf70633e7e506b31eb3562f1ae7d5ad82fb00704e6beedc7c61c347dfb
Verdict:
Malicious activity
Analysis date:
2025-07-07 08:05:27 UTC
Tags:
arch-exec susp-lnk loader auto-reg

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
shellcode dropper shell
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
attrib dropper evasive obfuscated persistence powershell
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-07-07 07:42:38 UTC
File Type:
Text (Batch)
AV detection:
6 of 24 (25.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
adware discovery execution persistence spyware
Behaviour
Checks processor information in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Drops file in Windows directory
Adds Run key to start application
Checks installed software on the system
Enumerates connected drives
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Downloads MZ/PE file
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Batch (bat) bat 58ce3719c896c53d7f3404151c0c2f418d390658a97eb3e1d1ed75939a4e2701

(this sample)

  
Delivery method
Distributed via web download

Comments