MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5990f979cf3a9162a5940eb3b76aec42cba8ab4a1868a7f8f779264c3e99fbaa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 5990f979cf3a9162a5940eb3b76aec42cba8ab4a1868a7f8f779264c3e99fbaa
SHA3-384 hash: ac1d234020c90f33f1b2fb42570571a6fa244c3f16ffaf099347a1ac1756e889d2539c32acfb75aedde27fe60945cd4a
SHA1 hash: bbc3a7c352bdc4ac9b81860f650e93f94a0294cd
MD5 hash: fb78680067d5fec230b789665c8ea8cb
humanhash: freddie-zulu-pasta-batman
File name:PYT0021002025001.js
Download: download sample
File size:140'764 bytes
First seen:2026-02-27 07:25:19 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 1536:e60lVlVlVlVlVlDZe8pDHIvGJGamqlVlVlVlVlVlVlD:e60lVlVlVlVlVlHlVlVlVlVlVlVlD
TLSH T19AD3921653AE4248F5F7474E81AB023053AFFC76293F419D9661A2494FFAB049DA83F3
TrID 66.6% (.TXT) Text - UTF-16 (LE) encoded (2000/1)
33.3% (.MP3) MP3 audio (1000/1)
Magika txt
Reporter JAMESWT_WT
Tags:js webdot-ddns-net

Intelligence


File Origin
# of uploads :
1
# of downloads :
106
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
94.9%
Tags:
xtreme shell overt
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 evasive guloader obfuscated powershell repaired soft-404
Verdict:
Malicious
File Type:
js
First seen:
2025-05-09T06:51:00Z UTC
Last seen:
2025-05-09T07:30:00Z UTC
Hits:
~10
Detections:
PDM:Trojan.Win32.Generic Trojan.Win32.Agent.sb Trojan.JS.SAgent.sb HEUR:Trojan.Script.Generic
Gathering data
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-05-08 23:22:53 UTC
File Type:
Text (JavaScript)
AV detection:
5 of 36 (13.89%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
Command and Scripting Interpreter: PowerShell
Checks computer location settings
Badlisted process makes network request
Malware Config
Dropper Extraction:
https://www.pastery.net/ekgwgt/raw/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments