MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c6a74bfb5d9aa2f4e17a30ccbdf3b79ab9d1487e37fd4e8f24f4741cad102cd0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: c6a74bfb5d9aa2f4e17a30ccbdf3b79ab9d1487e37fd4e8f24f4741cad102cd0
SHA3-384 hash: ec59c3de70920261ad44236f19c7f376ea9cd5b598882927dc4769a27d8168696ea4f092034df89c85f7d00c59db8644
SHA1 hash: 122fc9e9ccc24ab081fa3770e187ce426901dde1
MD5 hash: 906f349fdb1949e13b79b96c7b97b784
humanhash: equal-alpha-golf-wolfram
File name:Microsoft Edge.ps1
Download: download sample
File size:6'258'820 bytes
First seen:2025-10-23 18:09:32 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 768:frORDmJt+x/Z+sZAyQqJJXSoFPWnL+/9rPqyXlDy1Mwoj2IH4BFNKGwVwMPeLuXX:fqn
Threatray 371 similar samples on MalwareBazaar
TLSH T12656BF2257EB1F9953D0CCFAF3497646C898CD6B7E95B03CF67240A3A43AB06C152798
Magika powershell
Reporter smica83
Tags:ps1

Intelligence


File Origin
# of uploads :
1
# of downloads :
65
Origin country :
HU HU
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
ps1
First seen:
2025-10-23T15:28:00Z UTC
Last seen:
2025-10-23T16:07:00Z UTC
Hits:
~10
Detections:
Backdoor.MSIL.AsyncRat.a
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
AI detected malicious Powershell script
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1800853 Sample: Microsoft Edge.ps1 Startdate: 23/10/2025 Architecture: WINDOWS Score: 56 12 Malicious sample detected (through community Yara rule) 2->12 14 AI detected malicious Powershell script 2->14 16 Joe Sandbox ML detected suspicious sample 2->16 6 powershell.exe 20 2->6         started        process3 process4 8 powershell.exe 27 6->8         started        10 conhost.exe 6->10         started       
Gathering data
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery execution spyware stealer
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: PowerShell
System Location Discovery: System Language Discovery
Drops file in Windows directory
Executes dropped EXE
Reads user/profile data of web browsers
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments