MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c058b74dd6531f4eb3c48d633797d40e393b1c870d9ebe29c5165de011652d42. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: c058b74dd6531f4eb3c48d633797d40e393b1c870d9ebe29c5165de011652d42
SHA3-384 hash: 19882170785a138be7b3798a5794970243b20bc8a49a7e0203a2ce5e7570d09f3a1412fba8752c0004acd02cb22a6c56
SHA1 hash: eab3b0127adf6443f3883b2ac3da597dbbdfb05c
MD5 hash: f5d3d7f693532293813e4dff414fdfbf
humanhash: queen-twenty-nitrogen-lake
File name:create.py
Download: download sample
File size:5'309 bytes
First seen:2024-12-03 15:55:35 UTC
Last seen:Never
File type:
MIME type:text/plain
ssdeep 96:1u6d+u8UitaOvPcFXXc165uCzLghzXYsSX9VOP:B/nXc165uCz8hzXYzX9VOP
TLSH T103B12499BAA24F724D64DF04F32285D9B062E1870460DF1AB4FB70BCFDBAE59E604147
Magika txt
Reporter abuse_ch
Tags:py

Intelligence


File Origin
# of uploads :
1
# of downloads :
82
Origin country :
DE DE
Vendor Threat Intelligence
Threat name:
Script-Shell.Downloader.Heuristic
Status:
Malicious
First seen:
2024-12-03 15:56:04 UTC
File Type:
Text (Shell)
AV detection:
9 of 38 (23.68%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

c058b74dd6531f4eb3c48d633797d40e393b1c870d9ebe29c5165de011652d42

(this sample)

  
Delivery method
Distributed via web download

Comments