MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 69edeac98f1cf614188ce821b21118a1464f88de3dcd55d700bb66d710cde57c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PureHVNC


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: 69edeac98f1cf614188ce821b21118a1464f88de3dcd55d700bb66d710cde57c
SHA3-384 hash: 1c37bafd8859a04b03faf4d0500970265054c1131a8b3d21a0e4065000c203406588129d5ce3fbbe2b8a8dc9a517b627
SHA1 hash: b491984a7929106ed6caa2ae781baf7c72cf48df
MD5 hash: 4975700ad3298cec299c66c34319ca15
humanhash: summer-five-crazy-foxtrot
File name:69edeac98f1cf614188ce821b21118a1464f88de3dcd55d700bb66d710cde57c.js
Download: download sample
Signature PureHVNC
File size:393'868 bytes
First seen:2026-04-17 05:34:40 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 12288:enmtcogz3s+N0JC8uDH5y2l2HXYJON2p+2KoB:5tc9I+sHXV9oB
Threatray 132 similar samples on MalwareBazaar
TLSH T16F843A3439EB5019B2B3AF599FE8B4D6DD6FBB732B07941D1051038A4B23A81DDC2639
TrID 66.6% (.TXT) Text - UTF-16 (LE) encoded (2000/1)
33.3% (.MP3) MP3 audio (1000/1)
Magika txt
Reporter JAMESWT_WT
Tags:everycarebd-com js PureHVNC

Intelligence


File Origin
# of uploads :
1
# of downloads :
120
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
70%
Tags:
virus shell spawn
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
aes base64 base64 crypto evasive horse nemucod obfuscated packed powershell repaired
Verdict:
Malicious
File Type:
js
First seen:
2026-04-09T17:53:00Z UTC
Last seen:
2026-04-19T03:35:00Z UTC
Hits:
~1000
Detections:
Trojan.MSIL.Agent.sb Trojan.JS.SAgent.sb HEUR:Trojan.Script.Generic HEUR:Trojan-Downloader.Script.Generic
Gathering data
Threat name:
Script-JS.Trojan.Boxter
Status:
Malicious
First seen:
2026-04-10 01:09:36 UTC
AV detection:
7 of 24 (29.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
collection discovery execution
Behaviour
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Browser Information Discovery
Command and Scripting Interpreter: JavaScript
System Time Discovery
Drops file in Windows directory
Accesses Microsoft Outlook profiles
Badlisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments