MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 851083c6feecac2d7866bcfe6de832fdee5a03fafe603911187cd6976449ec87. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 851083c6feecac2d7866bcfe6de832fdee5a03fafe603911187cd6976449ec87
SHA3-384 hash: 3b27f0e036d46f50830311eea0d07ac75ca2cb33cb72e5166ee2d0449df04c2cd5ef8d51fdc4a1e5429ce9f87255fb4b
SHA1 hash: ab38997087f3513797e9f3df0f35319c265009b3
MD5 hash: 67bf3bbdff98cf3c46d69831cce5ee17
humanhash: fifteen-black-xray-india
File name:result.hta
Download: download sample
File size:4'841 bytes
First seen:2026-02-24 18:22:20 UTC
Last seen:Never
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 96:riAIyCCHVFH4jl+cmtc6LfkBYJDD1v5kW1EItQ3+llN:EI4jbW6Yph5WItQulT
TLSH T1D9A12A74CA9E2CC4C901C1BC3ADA646F588CA5B803B03772972A9BCD78C4B5309F01D3
Magika vba
Reporter abuse_ch
Tags:hta

Intelligence


File Origin
# of uploads :
1
# of downloads :
48
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Payload URLs
URL
File name
http://roverbot.info/killxd.bat
HTA File
Behaviour
BlacklistAPI detected
Verdict:
Malicious
File Type:
hta
Detections:
HEUR:Trojan-Downloader.Script.Generic HEUR:Trojan.Script.Generic NetTool.cURLGet.HTTP.C&C
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
68 / 100
Signature
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Obfuscated command line found
Sigma detected: Legitimate Application Dropped Script
Sigma detected: Suspicious MSHTA Child Process
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1874286 Sample: result.hta Startdate: 24/02/2026 Architecture: WINDOWS Score: 68 34 roverbot.info 2->34 40 Antivirus detection for URL or domain 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 Sigma detected: Suspicious MSHTA Child Process 2->44 46 Sigma detected: Legitimate Application Dropped Script 2->46 11 mshta.exe 2 2->11         started        signatures3 process4 file5 32 C:\Users\user\AppData\Local\...L9XEAGq.bat, DOS 11->32 dropped 48 Obfuscated command line found 11->48 15 cmd.exe 1 11->15         started        signatures6 process7 process8 17 conhost.exe 15->17         started        19 conhost.exe 15->19         started        process9 21 cmd.exe 1 17->21         started        process10 23 cmd.exe 1 21->23         started        process11 25 curl.exe 2 23->25         started        28 cmd.exe 1 23->28         started        30 conhost.exe 23->30         started        dnsIp12 36 roverbot.info 172.67.184.195, 49717, 80 CLOUDFLARENETUS United States 25->36 38 127.0.0.1 unknown unknown 25->38
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
Html VBScript in Html
Threat name:
Script-WScript.Trojan.Asthma
Status:
Malicious
First seen:
2026-02-24 18:23:30 UTC
File Type:
Text
AV detection:
5 of 24 (20.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Checks computer location settings
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MalScript_Tricks
Author:@bartblaze
Description:Identifies tricks often seen in malicious scripts such as moving the window off-screen or resizing it to zero.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

HTML Application (hta) hta 851083c6feecac2d7866bcfe6de832fdee5a03fafe603911187cd6976449ec87

(this sample)

  
Delivery method
Distributed via web download

Comments