MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7a36de5eecbcd7f5e415601ae9632c139b59bc5b9370c61ca89ea0536508dd2c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 6 File information Comments

SHA256 hash: 7a36de5eecbcd7f5e415601ae9632c139b59bc5b9370c61ca89ea0536508dd2c
SHA3-384 hash: ca9a9c46a9edbe74fa7dc1707895b42b156bc36b5662aa3fab8d1dc5d6aa63e95bd13aa47c52bc7ebb697dd10f676e5f
SHA1 hash: 87efaaff4fca74e8ee43f668204fe864abc9aaf7
MD5 hash: d5dab15cda0f1dbc686f52c3266c0165
humanhash: sad-emma-burger-happy
File name:Assessment_Order.zip
Download: download sample
File size:2'740 bytes
First seen:2026-03-17 13:24:58 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 48:9kPp8HW+Duc7xGZOfBdlHmIzxRP6z/QEiDrxVjvAAiJmrAZr/CnKy0YDQfe0jG:ePpyfuQGZOpdlHm8xRPSQE8tlMjKd0jG
TLSH T1BF515BAC1F281810F8B9B2FA36A718ABC434B0FCA568CB53817E67251604D05DC86A9C
Magika zip
Reporter JAMESWT_WT
Tags:43-160-214-122 vbs xvozxer-icu ywdtwss-icu zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
51
Origin country :
IT IT
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Assessment_Order.vbs
File size:7'913 bytes
SHA256 hash: 694557f2001b231e4c25800e5cfc784d4244559f1c6d89b88899088902722871
MD5 hash: 31d51b07e10ba45247e51cbd3434ea46
MIME type:text/plain
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.2%
Tags:
shell overt sage
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm evasive fingerprint lolbin masquerade powershell wscript
Result
Verdict:
SUSPICIOUS
Details
Hidden Powershell
Detected a pivot to Powershell that utilizes commonly nefarious attributes such as '-windowstyle hidden'.
Gathering data
Threat name:
Script-WScript.Trojan.Heuristic
Status:
Malicious
First seen:
2026-03-17 13:25:42 UTC
File Type:
Binary (Archive)
Extracted files:
1
AV detection:
7 of 23 (30.43%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_powershell
Author:daniyyell
Description:Detects suspicious PowerShell activity related to malware execution
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments