MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6df062ffcb7dbeddecd3107133e13b87f59b655e0861a66a780ba57702cb4fb8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 3 File information Comments

SHA256 hash: 6df062ffcb7dbeddecd3107133e13b87f59b655e0861a66a780ba57702cb4fb8
SHA3-384 hash: e88c49bd49e69f528ce7167ae48eb8e701ebf705e126f610c29ad9927eb9468eded363e488ac9f8765e1b287c767dd75
SHA1 hash: 8a9a813c66d2d6e5e1793adc0019b11ecd4b3229
MD5 hash: 2611a5ad80dcddf3fd6b388b7e32e1c2
humanhash: stream-december-virginia-november
File name:6df062ffcb7dbeddecd3107133e13b87f59b655e0861a66a780ba57702cb4fb8.ps1
Download: download sample
File size:23'316 bytes
First seen:2026-03-31 07:29:26 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 384:kPsWWxuUp++bPznn2eNithb51OUtqgF+mY+0ROwLr7Rfd9E5axsojkol9Vb7Dgcz:kRUjPznZshb52gomYNXtfdJvIol9Vccz
TLSH T1C1A2D0C09DECEB98CCA58B21E5FC200E73A0D1D65939DC8D57272D5DBE3A2D02BA7065
Magika powershell
Reporter JAMESWT_WT
Tags:hui228-ru ps1

Intelligence


File Origin
# of uploads :
1
# of downloads :
65
Origin country :
IT IT
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
Score:
99.1%
Tags:
autorun xtreme virus shell
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 obfuscated powershell powershell
Verdict:
Malicious
File Type:
ps1
First seen:
2025-10-24T20:48:00Z UTC
Last seen:
2026-03-31T05:09:00Z UTC
Hits:
~100
Detections:
HEUR:Trojan-Dropper.MSIL.Agent.gen Trojan-Downloader.Agent.HTTP.C&C Trojan.PowerShell.Agent.sb PDM:Trojan.Win32.Generic NetTool.PowerShellUA.HTTP.C&C NetTool.PowerShellGet.HTTP.C&C
Verdict:
Malware
YARA:
1 match(es)
Tags:
Base64 Block Contains Base64 Block DeObfuscated PowerShell
Verdict:
Malicious
Threat:
NetTool.PowerShellUA.HTTP
Result
Malware family:
n/a
Score:
  8/10
Tags:
defense_evasion execution
Behaviour
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Obfuscated Files or Information: Command Obfuscation
Drops startup file
Modifies visibility of existing users in the login screen
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Base64_Encoded_Powershell_Directives
Rule name:SUSP_PowerShell_Base64_Decode
Author:SECUINFRA Falcon Team
Description:Detects PowerShell code to decode Base64 data. This can yield many FP
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments