MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 994b9bc52b6477e24dfc7aac6d11d21643df58221c73dde96aa82d58a938c31e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 10
| SHA256 hash: | 994b9bc52b6477e24dfc7aac6d11d21643df58221c73dde96aa82d58a938c31e |
|---|---|
| SHA3-384 hash: | 677494d006e3fe77bfa21177705161f8f4e265cb916b647042fdac07d50861719ed9e439a25f429f4cddea5816ea3b11 |
| SHA1 hash: | 73cb99c55acb3e43ac525dfdc456d3a98ee79fb4 |
| MD5 hash: | 39c67bff3d885ad52c421a12b19bac03 |
| humanhash: | green-three-rugby-xray |
| File name: | 85.209.11.15.ps1 |
| Download: | download sample |
| File size: | 123'433 bytes |
| First seen: | 2025-01-14 17:03:48 UTC |
| Last seen: | 2025-01-17 08:14:49 UTC |
| File type: | |
| MIME type: | text/plain |
| ssdeep | 3072:72sz0orzAOok9Y3sOGnuerPkwo67g3Lk7pyFV50GuGdtqphBddqyIFr2JdyPrnxt:72s1zAOok9Y3sOGnuerPkwo67g3Lk7p2 |
| TLSH | T136C32A711207BCCE97BF2F89E8843AA11C9C6077AB548594FDC906B952AF5208F7CDB4 |
| Magika | powershell |
| Reporter | |
| Tags: | 85-209-11-15 booking ps1 |
Intelligence
File Origin
# of uploads :
2
# of downloads :
95
Origin country :
ITVendor Threat Intelligence
Detection(s):
Verdict:
Malicious
Score:
81.4%
Tags:
spawn
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
confuserex net obfuscated
Verdict:
Malicious
Labled as:
PowerShell/Agent.CDT trojan
Result
Verdict:
MALICIOUS
Details
Base64 Encoded Powershell Directives
Detected one or more base64 encoded Powershell directives.
Base64 Encoded URL
Detected an ANSI or UNICODE http:// or https:// base64 encoded URL prefix.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
76 / 100
Signature
AI detected suspicious sample
Antivirus detection for URL or domain
Injects a PE file into a foreign processes
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Yara detected Powershell download and execute
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
SCRIPT
Threat name:
Script.Trojan.Heuristic
Status:
Malicious
First seen:
2025-01-14 11:50:37 UTC
File Type:
Text (PowerShell)
AV detection:
4 of 23 (17.39%)
Threat level:
2/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
6/10
Tags:
discovery execution persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Adds Run key to start application
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
ps1 994b9bc52b6477e24dfc7aac6d11d21643df58221c73dde96aa82d58a938c31e
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.