MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b538462b16ad3bc5791fe43a841ad2d8bdccc9899ec742fc2f71bfb8e30a9b4e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: b538462b16ad3bc5791fe43a841ad2d8bdccc9899ec742fc2f71bfb8e30a9b4e
SHA3-384 hash: 1f3e347201a33540cb66288f53c2dba1ddfc4276480b6673c865a45b2c22e4bb6b6c215a2a70cabbbd96ddd6b1fdef81
SHA1 hash: fbd837cd751f640e65f4fb121a93ff594906cd19
MD5 hash: a3b768e7d943716fa2e638e62f418e9d
humanhash: orange-connecticut-summer-ink
File name:result.hta
Download: download sample
File size:4'840 bytes
First seen:2026-02-26 19:01:19 UTC
Last seen:Never
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 96:riAIyCCHVFH4jl+cmtc6LfrBYJDD1v5kW1EItQ3+llN:EI4jbW9Yph5WItQulT
TLSH T1B1A11974CA9E2CC4C901C1BC3ADA646B588CA5B802B03772872A9BCD78C4B5319F01D3
Magika vba
Reporter abuse_ch
Tags:hta

Intelligence


File Origin
# of uploads :
1
# of downloads :
45
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Payload URLs
URL
File name
http://roverlink.io/killxd.bat
HTA File
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
cmd conhost evasive lolbin
Verdict:
Malicious
File Type:
hta
Detections:
HEUR:Trojan.Script.Generic HEUR:Trojan-Downloader.Script.Generic NetTool.cURLGet.HTTP.C&C
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
68 / 100
Signature
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Obfuscated command line found
Sigma detected: Legitimate Application Dropped Script
Sigma detected: Suspicious MSHTA Child Process
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1875565 Sample: result.hta Startdate: 26/02/2026 Architecture: WINDOWS Score: 68 34 roverlink.io 2->34 40 Antivirus detection for URL or domain 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 Sigma detected: Suspicious MSHTA Child Process 2->44 46 Sigma detected: Legitimate Application Dropped Script 2->46 11 mshta.exe 2 2->11         started        signatures3 process4 file5 32 C:\Users\user\AppData\Local\...L9XEAGq.bat, DOS 11->32 dropped 48 Obfuscated command line found 11->48 15 cmd.exe 1 11->15         started        signatures6 process7 process8 17 conhost.exe 15->17         started        19 conhost.exe 15->19         started        process9 21 cmd.exe 1 17->21         started        process10 23 cmd.exe 1 21->23         started        process11 25 curl.exe 2 23->25         started        28 cmd.exe 1 23->28         started        30 conhost.exe 23->30         started        dnsIp12 36 roverlink.io 104.21.84.65, 49695, 80 CLOUDFLARENETUS United States 25->36 38 127.0.0.1 unknown unknown 25->38
Gathering data
Threat name:
Script-WScript.Trojan.Asthma
Status:
Malicious
First seen:
2026-02-26 19:02:07 UTC
File Type:
Text
AV detection:
4 of 36 (11.11%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Checks computer location settings
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MalScript_Tricks
Author:@bartblaze
Description:Identifies tricks often seen in malicious scripts such as moving the window off-screen or resizing it to zero.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

HTML Application (hta) hta b538462b16ad3bc5791fe43a841ad2d8bdccc9899ec742fc2f71bfb8e30a9b4e

(this sample)

  
Delivery method
Distributed via web download

Comments