MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ca33f34c399803d003da98b75b3eb192195a97618bde71a5b50025431a0cefcc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: ca33f34c399803d003da98b75b3eb192195a97618bde71a5b50025431a0cefcc
SHA3-384 hash: 16194e8b57a3f7c0904863408fccf904817d8a3518f0b5fdb50112489abc58884131464b3ef576646b63d839c6d975e2
SHA1 hash: c950506d6ac232f86fffc9d13197e60db0dd1ca5
MD5 hash: b3f996b348623f44effcbd3f7d853bc4
humanhash: don-pizza-don-undress
File name:ps.ps1
Download: download sample
File size:51 bytes
First seen:2026-03-18 14:00:32 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 3:VSJJFIqF1F65IFWsIMgKMn:s8qF1FEsIM0n
TLSH T12890021D451050FA5B959134D118440018B1394DC8B0A6DB2105440A0441AA4D66440A
Magika batch
Reporter JAMESWT_WT
Tags:asmweosiqsaaw-com booking ClickFix FakeCaptcha ps1

Intelligence


File Origin
# of uploads :
1
# of downloads :
46
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
81.4%
Tags:
obfuscate shell agent
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
obfuscated powershell soft-404
Result
Gathering data
Verdict:
Malicious
File Type:
PowerShell
Detections:
Trojan.PowerShell.Cobalt.sb
Gathering data
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: PowerShell
Badlisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments