MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 994b9bc52b6477e24dfc7aac6d11d21643df58221c73dde96aa82d58a938c31e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 994b9bc52b6477e24dfc7aac6d11d21643df58221c73dde96aa82d58a938c31e
SHA3-384 hash: 677494d006e3fe77bfa21177705161f8f4e265cb916b647042fdac07d50861719ed9e439a25f429f4cddea5816ea3b11
SHA1 hash: 73cb99c55acb3e43ac525dfdc456d3a98ee79fb4
MD5 hash: 39c67bff3d885ad52c421a12b19bac03
humanhash: green-three-rugby-xray
File name:85.209.11.15.ps1
Download: download sample
File size:123'433 bytes
First seen:2025-01-14 17:03:48 UTC
Last seen:2025-01-17 08:14:49 UTC
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 3072:72sz0orzAOok9Y3sOGnuerPkwo67g3Lk7pyFV50GuGdtqphBddqyIFr2JdyPrnxt:72s1zAOok9Y3sOGnuerPkwo67g3Lk7p2
TLSH T136C32A711207BCCE97BF2F89E8843AA11C9C6077AB548594FDC906B952AF5208F7CDB4
Magika powershell
Reporter JAMESWT_WT
Tags:85-209-11-15 booking ps1

Intelligence


File Origin
# of uploads :
2
# of downloads :
95
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
81.4%
Tags:
spawn
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
confuserex net obfuscated
Result
Verdict:
MALICIOUS
Details
Base64 Encoded Powershell Directives
Detected one or more base64 encoded Powershell directives.
Base64 Encoded URL
Detected an ANSI or UNICODE http:// or https:// base64 encoded URL prefix.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
76 / 100
Signature
AI detected suspicious sample
Antivirus detection for URL or domain
Injects a PE file into a foreign processes
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Yara detected Powershell download and execute
Behaviour
Behavior Graph:
Threat name:
Script.Trojan.Heuristic
Status:
Malicious
First seen:
2025-01-14 11:50:37 UTC
File Type:
Text (PowerShell)
AV detection:
4 of 23 (17.39%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
discovery execution persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Adds Run key to start application
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PowerShell (PS) ps1 994b9bc52b6477e24dfc7aac6d11d21643df58221c73dde96aa82d58a938c31e

(this sample)

  
Delivery method
Distributed via web download

Comments