MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b6b7d304d1af5ccce2da4c7544e8f12a791e16bc020662f10c13660e445505a9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: b6b7d304d1af5ccce2da4c7544e8f12a791e16bc020662f10c13660e445505a9
SHA3-384 hash: 85899c2967f05db0f613eb05ed0ab70a8f77c9b3528003763c94547103ce369eedb96f981e29b107eb5d301c63f79952
SHA1 hash: b27188ff64b42d93a9dba967fb7d00fdacd34516
MD5 hash: 9764f03106217b08ab7cccc009144059
humanhash: east-lamp-harry-skylark
File name:create.py
Download: download sample
File size:5'260 bytes
First seen:2025-02-25 17:17:50 UTC
Last seen:Never
File type:
MIME type:text/plain
ssdeep 96:1u6d+u8UZOvOc4cacx1NeLCc8gyYx+iiqLP:BAfx1NeLCcXyYxPiqLP
TLSH T176B147997A214B720CA8DFD2F2218131B243D19F84D7CFCA76BD70BCAEBDE54A514606
Magika txt
Reporter abuse_ch
Tags:py

Intelligence


File Origin
# of uploads :
1
# of downloads :
83
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2025-02-25 17:18:16 UTC
File Type:
Text (Shell)
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

b6b7d304d1af5ccce2da4c7544e8f12a791e16bc020662f10c13660e445505a9

(this sample)

  
Delivery method
Distributed via web download

Comments