MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bd2ffc3e22d5b20114546fbdef591ae3ebb3873f3caac0e0471526a08e9659d3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA 3 File information Comments

SHA256 hash: bd2ffc3e22d5b20114546fbdef591ae3ebb3873f3caac0e0471526a08e9659d3
SHA3-384 hash: ed54dfd5b9eb2cc3419528aebdb99dec6b4ea97cc52405e0386d356e39411d166ad6eb83910759a0d1d93f02dba096b7
SHA1 hash: 9b8bd41df22a6de40ea626c784ce101f60093441
MD5 hash: da1738b17fe3d8ceb095c8cd1424bb9d
humanhash: berlin-texas-green-fish
File name:load.ps1
Download: download sample
File size:251 bytes
First seen:2026-03-08 19:19:33 UTC
Last seen:2026-03-08 19:19:39 UTC
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 6:eliUil9MyzpMoDgAfd27zVWlrOhMFI1R3KrO7:eUFlKyziIgudEWZOhMgkrO7
TLSH T154D0973EA614859080A4AA6CB02CF0DBDA8FA68A1E5CE6101A9C899074100A742BE4AA
Magika powershell
Reporter abuse_ch
Tags:ps1

Intelligence


File Origin
# of uploads :
2
# of downloads :
82
Origin country :
SE SE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
dropper lolbin obfuscated update
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
64 / 100
Signature
AI detected malicious Powershell script
Antivirus detection for URL or domain
Joe Sandbox ML detected suspicious sample
Suricata IDS alerts for network traffic
Behaviour
Behavior Graph:
Gathering data
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: PowerShell
Badlisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_powershell
Author:daniyyell
Description:Detects suspicious PowerShell activity related to malware execution
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:Detect_Remcos_RAT
Author:daniyyell
Description:Detects Remcos RAT payloads and commands

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PowerShell (PS) ps1 bd2ffc3e22d5b20114546fbdef591ae3ebb3873f3caac0e0471526a08e9659d3

(this sample)

  
Delivery method
Distributed via web download

Comments