MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7b37f1c98dff90cfbe4f8fb59de98c42701d7d1a69d2ce934d86ecfa4e9bd1fc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: 7b37f1c98dff90cfbe4f8fb59de98c42701d7d1a69d2ce934d86ecfa4e9bd1fc
SHA3-384 hash: 6d63e17a7f8282eabc410cfbc055886e8b7bf9dffaeaad8cb3cc5b90a543ec3d841050947f61f171822b582d651b63f5
SHA1 hash: e85cd5908d497db4312005a26e97ea6b66c0dffd
MD5 hash: bf55b06b29d929af3924bcdca577863c
humanhash: happy-kilo-vermont-charlie
File name:Rendeles TECHNOFLEX Hungary Kft. 3474_NGYR_20251020_AUDIEA888EVO5.bat
Download: download sample
File size:7'229 bytes
First seen:2025-11-18 17:16:39 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/plain
ssdeep 96:nXJ/PnUCkTah4oUCOqaA+gehKND30rrG43jQY71U2oFA7wnW7r8W7kHOVypuk:Z0KLUCxageOD3SPvZCUH79wp1
TLSH T1EAE109264FD2752BFC506AEDE51BA9C74C1EDAD7EC2923BC2434392E6421E50233D355
Magika unknown
Reporter smica83
Tags:bat HUN

Intelligence


File Origin
# of uploads :
1
# of downloads :
39
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Rendeles_TECHNOFLEX_Hungary_Kft._3474_NGYR_20251020_AUDIEA888EVO5.gz
Verdict:
Malicious activity
Analysis date:
2025-11-18 08:33:43 UTC
Tags:
arch-exec

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
xtreme shell sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
DNS request
Connection attempt
Using obfuscated Powershell scripts
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
base64 obfuscated powershell
Verdict:
Malicious
File Type:
ps1
First seen:
2025-11-18T03:38:00Z UTC
Last seen:
2025-11-20T11:49:00Z UTC
Hits:
~100
Detections:
HEUR:Trojan.BAT.Obfuscated.gen
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
60 / 100
Signature
Encrypted powershell cmdline option found
Joe Sandbox ML detected suspicious sample
Obfuscated command line found
Sigma detected: Potential PowerShell Command Line Obfuscation
Suspicious powershell command line found
Behaviour
Behavior Graph:
Threat name:
Script-PowerShell.Trojan.GuLoader
Status:
Malicious
First seen:
2025-11-18 11:30:55 UTC
File Type:
Text
AV detection:
3 of 38 (7.89%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments