MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 59186b9ea2efaf72bd19d8f2583985499796a68e4d0945a51559621c79beff13. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 59186b9ea2efaf72bd19d8f2583985499796a68e4d0945a51559621c79beff13
SHA3-384 hash: f227c5f85e6f8fa68033f24ec970aeeb00959eb017bbd8f7a3dc0894e7d70beecad7524e9585ec213014412552ee33ed
SHA1 hash: 30aaee80f11a3a99f25d7f95786cf5948befbacf
MD5 hash: ac16f36d35e8cf75ff3dd6492e0c9b34
humanhash: ceiling-cat-mississippi-bluebird
File name:suspicious.txt.bat
Download: download sample
File size:82 bytes
First seen:2025-03-31 10:06:27 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/plain
ssdeep 3:rNo+QRAdVLWQmYcKKKlTREu4SLXRFLw1n:ZovMWHYc3Kln4Sjc
TLSH T16DA01220125C58105C0091462D1642E6822304D037100219C064D8403828687701F444
Magika batch
Reporter zhuzhu0009
Tags:bat

Intelligence


File Origin
# of uploads :
1
# of downloads :
85
Origin country :
JP JP
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
suspicious.txt
Verdict:
Malicious activity
Analysis date:
2025-03-31 09:31:58 UTC
Tags:
cve-2017-0199 exploit pua adware

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
90.2%
Tags:
driverpack phishing
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
lolbin masquerade mshta
Result
Threat name:
n/a
Detection:
suspicious
Classification:
evad
Score:
22 / 100
Signature
Uses an obfuscated file name to hide its real file extension (double extension)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1652712 Sample: suspicious.txt.bat Startdate: 31/03/2025 Architecture: WINDOWS Score: 22 14 update.drp.su 2->14 18 Uses an obfuscated file name to hide its real file extension (double extension) 2->18 7 cmd.exe 1 2->7         started        signatures3 process4 process5 9 mshta.exe 15 7->9         started        12 conhost.exe 7->12         started        dnsIp6 16 update.drp.su 37.9.8.75, 49691, 80 SELECTELRU Russian Federation 9->16
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Blocklisted process makes network request
Malware Config
Dropper Extraction:
http://update.drp.su/nps/offline/bin/tools/run.hta
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments