MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5a1d5612e4bcbf247f82b0beeaa0287a5353fc9103bcd29a9b20aa17b4f56ad1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 5a1d5612e4bcbf247f82b0beeaa0287a5353fc9103bcd29a9b20aa17b4f56ad1
SHA3-384 hash: c08ef17baf49bd78dab0fdcb706d83784c8f8aab01b1f4afe38839612bc3d78a7222db15d623c937abcc34090371f0d3
SHA1 hash: ed4e849adb310792b6a07c52ed38f2de2c6554ef
MD5 hash: 509d802ee980ff9e789240d1dbb50828
humanhash: saturn-venus-nevada-yankee
File name:KENTREMCOSSSSS.ps1
Download: download sample
File size:664'928 bytes
First seen:2025-04-11 04:16:07 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 12288:M8kX5989kVnoyd9bFQtoNQ6x/NoDxs2rUl+ZOUkX884KZE/uXgYjj/wKlNGyO176:4X5s8fbWIQJxs4Ws802XgmRuht4
TLSH T1E2E42360154E9EFA858CE74DB0A3451F9EF24AA5A08D63D5E09BB7C3B45C309C1BD43E
Magika txt
Reporter JAMESWT_WT
Tags:176-65-142-190 ps1

Intelligence


File Origin
# of uploads :
1
# of downloads :
98
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1662765 Sample: KENTREMCOSSSSS.ps1 Startdate: 11/04/2025 Architecture: WINDOWS Score: 48 16 Joe Sandbox ML detected suspicious sample 2->16 6 powershell.exe 26 2->6         started        9 svchost.exe 1 1 2->9         started        process3 dnsIp4 18 Loading BitLocker PowerShell Module 6->18 12 conhost.exe 6->12         started        14 127.0.0.1 unknown unknown 9->14 signatures5 process6
Result
Malware family:
n/a
Score:
  3/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PowerShell (PS) ps1 5a1d5612e4bcbf247f82b0beeaa0287a5353fc9103bcd29a9b20aa17b4f56ad1

(this sample)

  
Delivery method
Distributed via web download

Comments