MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b4525711eafbd70288a9869825e5bb3045af072b5821cf8fbc89245aba57270a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: b4525711eafbd70288a9869825e5bb3045af072b5821cf8fbc89245aba57270a
SHA3-384 hash: bffc99038165b36c6718d561943e0b42717c23c31920d99115f5cec21beabd213ec124e90bacd3e54b177b07533304c6
SHA1 hash: d4346b246e56f3d15e24fe30b91f989ac243e252
MD5 hash: fe27e510850f077e970a158a1a7b4103
humanhash: indigo-lactose-zulu-minnesota
File name:b4525711eafbd70288a9869825e5bb3045af072b5821cf8fbc89245aba57270a.bat
Download: download sample
File size:251 bytes
First seen:2026-03-31 10:54:38 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/x-msdos-batch
ssdeep 6:hmyE81R3KupMFIs3DVMjTF41R3IWFJ2HddJHG2oZKFM2Moh0DA:M181kUMn5OF41R297hFfh4A
TLSH T1FCD0974B11240066CAB4CAA412AE7302AE4B312710032D9A322F543A7F180B3C2DA098
Magika batch
Reporter JAMESWT_WT
Tags:bat individually-bangkok-dedicated-static

Intelligence


File Origin
# of uploads :
1
# of downloads :
46
Origin country :
IT IT
Vendor Threat Intelligence
Gathering data
Malware family:
n/a
ID:
1
File name:
b4525711eafbd70288a9869825e5bb3045af072b5821cf8fbc89245aba57270a.bat
Verdict:
Suspicious activity
Analysis date:
2026-03-28 13:46:15 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
infosteal rapid
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a window
Launching a process
Running batch commands
Creating a process with a hidden window
DNS request
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-03-24T18:16:00Z UTC
Last seen:
2026-03-29T00:48:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan.BAT.Agent.gen
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments