MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c4e194747d9a268ff56ac1f0708745cbcc164751dcaa24f1a5a15acbe9c4d998. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: c4e194747d9a268ff56ac1f0708745cbcc164751dcaa24f1a5a15acbe9c4d998
SHA3-384 hash: a9e3b183cc00f5e331a6e3c692448c36129c731b96ca2473699b4589eac05bf4034770d480f59088228b92e0cb00ae9f
SHA1 hash: 43d9af0c411110905ab4ddf4e4f713101c74d9de
MD5 hash: 8e9e81d1b252d7fa99579e9cf2e4b4ba
humanhash: minnesota-sweet-kansas-wolfram
File name:c4e194747d9a268ff56ac1f0708745cbcc164751dcaa24f1a5a15acbe9c4d998.hta
Download: download sample
File size:59'598 bytes
First seen:2025-06-03 09:36:05 UTC
Last seen:Never
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 384:2BvfPXCa2gN2TUPdIajEV8rGrUOcSDakUsnEapQTQWe7VXPMr4Gr/vQGS2oWuUR6:M/CL7T0IfV8rQcSDQusnoICbPDKilPN
TLSH T12D436B7D034B98FD9263ECC48AD99893EF74862A8B6CC7C49F70FEEA251457490E580D
Magika vba
Reporter JAMESWT_WT
Tags:api-telegram-org--bot7834836576 hta

Intelligence


File Origin
# of uploads :
1
# of downloads :
76
Origin country :
IT IT
Vendor Threat Intelligence
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Payload URLs
URL
File name
https://ams1.vultrobjects.com/micbucket/Temp/0412.mp4
HTA File
Behaviour
BlacklistAPI detected
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
Bypasses PowerShell execution policy
Encrypted powershell cmdline option found
Joe Sandbox ML detected suspicious sample
PowerShell case anomaly found
Sigma detected: PowerShell Base64 Encoded Invoke Keyword
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious PowerShell Parameter Substring
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Uses the Telegram API (likely for C&C communication)
Behaviour
Behavior Graph:
Threat name:
Document-HTML.Packed.Generic
Status:
Suspicious
First seen:
2025-04-13 08:11:28 UTC
File Type:
Text (HTML)
Extracted files:
3
AV detection:
7 of 24 (29.17%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments