MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aa56ad19b81ddbe827d0ac377c44fd196588330343316f4a80746c2c3eff8872. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: aa56ad19b81ddbe827d0ac377c44fd196588330343316f4a80746c2c3eff8872
SHA3-384 hash: 253446fe3bdb41911de13c0b6b4b9b9b86f007c4189244179d06661c339b93339f22a16d66b5f2c3af9a49d8b9aab530
SHA1 hash: f25a61b601af4bc22796081873483e7b3ae6f838
MD5 hash: 44b4d50966753aeb4acad68ce4077040
humanhash: thirteen-pizza-mike-mobile
File name:new.ps1
Download: download sample
File size:2'025'090 bytes
First seen:2025-03-21 19:52:00 UTC
Last seen:2025-03-22 11:35:02 UTC
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 24576:wdXvIGAZZbuCwGFRBoxidaOGnRb9ay+5ICXepeJLdJjoXpd0wu1Mx/aj9d4WD/hK:0o8wRcFEpIULdXJs
Threatray 31 similar samples on MalwareBazaar
TLSH T11695C0324427BEBB379D39C894082D860E5A3EC7A254E890EF4C85B775986159FBC4FC
Magika powershell
Reporter skocherhan
Tags:176-65-144-3 opendir ps1


Avatar
skocherhan
http://176.65.144.3/FILE/new.ps1

Intelligence


File Origin
# of uploads :
3
# of downloads :
118
Origin country :
GB GB
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.2%
Tags:
vmdetect extens spawn virus
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
adaptive-context anti-vm dropper fingerprint lolbin obfuscated packed remote rozena stealer
Result
Verdict:
MALICIOUS
Details
Base64 Encoded URL
Detected an ANSI or UNICODE http:// or https:// base64 encoded URL prefix.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
56 / 100
Signature
Found suspicious powershell code related to unpacking or dynamic code loading
Malicious sample detected (through community Yara rule)
Powershell drops PE file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1645499 Sample: new.ps1 Startdate: 21/03/2025 Architecture: WINDOWS Score: 56 21 Malicious sample detected (through community Yara rule) 2->21 6 powershell.exe 16 2->6         started        10 svchost.exe 1 1 2->10         started        process3 dnsIp4 17 C:\Users\user\AppData\Local\Temp\x.exe, PE32 6->17 dropped 23 Found suspicious powershell code related to unpacking or dynamic code loading 6->23 25 Powershell drops PE file 6->25 13 x.exe 6->13         started        15 conhost.exe 6->15         started        19 127.0.0.1 unknown unknown 10->19 file5 signatures6 process7
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
System Location Discovery: System Language Discovery
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PowerShell (PS) ps1 aa56ad19b81ddbe827d0ac377c44fd196588330343316f4a80746c2c3eff8872

(this sample)

  
Delivery method
Distributed via web download

Comments