MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c55b01c484fb69ac1b52ce517007e588fb71ba71cfa223888b50447066ae5149. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: c55b01c484fb69ac1b52ce517007e588fb71ba71cfa223888b50447066ae5149
SHA3-384 hash: 1e45f951298aad664894941f4cc8af9f5f7953f216f4fcf0966a95b49fe5fa189f86c950a92993201877c2e12e30d38b
SHA1 hash: 0e8d5de68b70e53aac1330805a16067f212e7233
MD5 hash: 5d6e68166c9aaba5eb263741ff613e0b
humanhash: triple-social-may-enemy
File name:sirdeeeee.ps1
Download: download sample
File size:328'376 bytes
First seen:2025-04-11 04:15:28 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 6144:rklObHkE5iJW+Cp0zKRMN2l3QbNb+f4DqQtlx7J7cCeI0Qy8j4rxJvr/cK/:4EHkEQJWJiNN2aCwD37J7cCry8j4NxTd
TLSH T1B0642215BB3FA91C433C66BE32FF1B4B8D52F2055D4D0261A444AFAD126C9458C3BAED
Magika txt
Reporter JAMESWT_WT
Tags:176-65-142-190 ps1

Intelligence


File Origin
# of uploads :
1
# of downloads :
104
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1662769 Sample: sirdeeeee.ps1 Startdate: 11/04/2025 Architecture: WINDOWS Score: 48 16 Joe Sandbox ML detected suspicious sample 2->16 6 powershell.exe 25 2->6         started        9 svchost.exe 1 1 2->9         started        process3 dnsIp4 18 Loading BitLocker PowerShell Module 6->18 12 conhost.exe 6->12         started        14 127.0.0.1 unknown unknown 9->14 signatures5 process6
Threat name:
Text.Trojan.Generic
Status:
Suspicious
First seen:
2025-04-10 19:13:06 UTC
File Type:
Text
AV detection:
3 of 24 (12.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PowerShell (PS) ps1 c55b01c484fb69ac1b52ce517007e588fb71ba71cfa223888b50447066ae5149

(this sample)

  
Delivery method
Distributed via web download

Comments