MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a30dd4e074e5f2ed04b32f7833f6e53197d107818d8d2c8ee362ddb4d784126b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 3 File information Comments

SHA256 hash: a30dd4e074e5f2ed04b32f7833f6e53197d107818d8d2c8ee362ddb4d784126b
SHA3-384 hash: 0f40c05e4600a7f04a8d03ca85d4b41442069afd617f7ee22039033e04f9e7e31c72adfe4f608809c5ceb28c4e0af3ab
SHA1 hash: f450166732250b954ca3bef7b80cbffd1c0210c6
MD5 hash: 5f49ec4609b36467efb388a11f0a66ab
humanhash: berlin-washington-illinois-seven
File name:nAhddao.js
Download: download sample
File size:578'438 bytes
First seen:2026-05-05 07:57:05 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 12288:a/CHn9rLnDLM82DsuxNepnx2LfCTSLg4ncIQ7qK//TzJ5BC:a6HnxM8B3pILfCTSVcIQV55BC
TLSH T1FEC401B122139F8A532B4F6C94483740BC545AE7776CA1BCFAC401CB01F95689EFAAF4
Magika txt
Reporter JAMESWT_WT
Tags:github-com--porkiporki362-web js

Intelligence


File Origin
# of uploads :
1
# of downloads :
111
Origin country :
IT IT
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm base64 obfuscated obfuscated overlay packed repaired
Result
Gathering data
Verdict:
Malicious
File Type:
text
Detections:
Trojan.Win32.Zapchast.bhgd HEUR:Trojan.Win32.Agentb.gen
Verdict:
inconclusive
YARA:
1 match(es)
Result
Malware family:
n/a
Score:
  3/10
Tags:
execution
Behaviour
Command and Scripting Interpreter: JavaScript
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:SUSP_Reversed_Base64_Encoded_EXE_RID3291
Author:Florian Roth
Description:Detects an base64 encoded executable with reversed characters
Reference:Internal Research
Rule name:telebot_framework
Author:vietdx.mb
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments