MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c426915b181bc504a1baf2bc7e5d7103a29b81817595b654f92fe476b8058880. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: c426915b181bc504a1baf2bc7e5d7103a29b81817595b654f92fe476b8058880
SHA3-384 hash: d8f4daf12f84f0186766dde5579e1e740ed8ea5be7545fae0db980928c666164aa2d90cd4ac6b9614ced9c80f6af2ccc
SHA1 hash: bcce97e94c41650174774ca5cc7c6ecc49d57048
MD5 hash: d93d3f4dc74a9275ccd77a94ad4ec031
humanhash: vegan-alpha-eight-washington
File name:FedEx Doc.js
Download: download sample
File size:1'080'610 bytes
First seen:2026-02-16 15:06:07 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 384:J5s3ZNPrTEprs150rpPvLZ27OqMplwT4UY7m7hz31QBRE4:T
Threatray 415 similar samples on MalwareBazaar
TLSH T1E23517B2B819E59C63C9E803D74C1BA39D4CF3074CE316A87C6846F7576A68C8667D38
Magika javascript
Reporter James_inthe_box
Tags:exe js

Intelligence


File Origin
# of uploads :
1
# of downloads :
125
Origin country :
US US
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
95.7%
Tags:
obfuscate xtreme virus
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm base64 base64 fingerprint masquerade obfuscated obfuscated opendir overlay powershell repaired
Verdict:
Malicious
File Type:
js
Detections:
HEUR:Trojan.Script.Generic Trojan.JS.SAgent.sb
Verdict:
inconclusive
YARA:
1 match(es)
Threat name:
Script-JS.Trojan.Generic
Status:
Suspicious
First seen:
2026-02-16 10:38:44 UTC
AV detection:
6 of 38 (15.79%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: JavaScript
Command and Scripting Interpreter: PowerShell
Process spawned unexpected child process
Malware Config
Dropper Extraction:
https://ia600603.us.archive.org/13/items/msi-pro-with-b-64_202602/MSI_PRO_with_b64.png
Malware family:
PhantomStealer
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments