MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c32379e4567a926aa0d35d8123718e2ebeb15544a83a5b1da0269db5829d5ece. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 8 File information Comments 2

SHA256 hash: c32379e4567a926aa0d35d8123718e2ebeb15544a83a5b1da0269db5829d5ece
SHA3-384 hash: 5e89e374670e6315b3cd39984eb3eefe7d8ce3f0497f40752513fd122f3c25f980491be5d941fb8212272c9281095371
SHA1 hash: 389af5ce305d106cdb945fd3c33188ec2ae59805
MD5 hash: 71afc032342b400a00704cccc57815d4
humanhash: oven-high-skylark-carolina
File name:stage2.dec.js
Download: download sample
File size:115'332 bytes
First seen:2025-12-01 08:33:11 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 1536:q/7W6FtMZCqh6bBoN7Ua+P0ZzB3vOUrzZLT0rWLaPI+7zfbioataI0ca3siJ46jN:m9O3GUv1LosIca3sQ4A
TLSH T18AB33BCC6EA13361479773F1C4275E0F51BAE246980D8010EB3CD7C629ACA5AB5D7FA8
Magika javascript
Reporter marius_benthin
Tags:glassworm js vscode

Intelligence


File Origin
# of uploads :
1
# of downloads :
98
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
base64 evasive lolbin masquerade obfuscated repaired schtasks
Verdict:
Malicious
File Type:
js
First seen:
2025-12-02T19:25:00Z UTC
Last seen:
2025-12-02T19:43:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan.Script.Agent.gen
Verdict:
Malware
YARA:
2 match(es)
Tags:
Base64 Block Contains Base64 Block DeObfuscated PowerShell
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-12-01 08:34:19 UTC
File Type:
Text (JavaScript)
AV detection:
6 of 23 (26.09%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
execution
Behaviour
Command and Scripting Interpreter: JavaScript
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:detect_powershell
Author:daniyyell
Description:Detects suspicious PowerShell activity related to malware execution
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs
Author:ditekSHen
Description:Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
Rule name:Macos_Infostealer_Wallets_8e469ea0
Author:Elastic Security
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Java Script (JS) js c32379e4567a926aa0d35d8123718e2ebeb15544a83a5b1da0269db5829d5ece

(this sample)

Comments



Avatar
Marius Benthin commented on 2025-12-01 08:35:11 UTC

Correction: "Dropped by" instead of "Dropping": SHA256 fb07743d139f72fca4616b01308f1f705f02fda72988027bc68e9316655eadda

Avatar
Marius Benthin commented on 2025-12-01 08:35:10 UTC

Correction: "Dropped by" instead of "Dropping": SHA256 fb07743d139f72fca4616b01308f1f705f02fda72988027bc68e9316655eadda