MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cc9a9aeabf1702a9ea2775f5f6b4f8feef99f40fe54db013c3d783b2985dae8b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PXRECVOWEIWOEI


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: cc9a9aeabf1702a9ea2775f5f6b4f8feef99f40fe54db013c3d783b2985dae8b
SHA3-384 hash: 4f3066c2289834f71dff28007acde861fe783962822d26d547d3ab73af9fbc40b0b200459a601f8fd6eaa15056511f22
SHA1 hash: fe706a1cb77021f052f6b170aa48fdd3025c0ce9
MD5 hash: 4d16e8168c71595c3ca7c7e87dafe2ee
humanhash: charlie-arkansas-massachusetts-sierra
File name:Holiday_trip_site.js
Download: download sample
Signature PXRECVOWEIWOEI
File size:1'191'704 bytes
First seen:2026-01-26 18:44:31 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 96:WH9wCu9ikvQkdgLih4zfPnLiPWwxStgDs6kuNkTgLik4YwY/Z6hnNiTwQhZuGfZG:Qj
Threatray 142 similar samples on MalwareBazaar
TLSH T1BF4501F525B59A8227F3F668FD5A21A58D04C33410A7D8146382CDEDF7A069C7FB093A
Magika javascript
Reporter Anonymous
Tags:js PXRECVOWEIWOEI

Intelligence


File Origin
# of uploads :
1
# of downloads :
102
Origin country :
US US
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
90.9%
Tags:
obfuscate xtreme shell
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm base64 fingerprint obfuscated powershell repaired
Verdict:
Malicious
File Type:
js
First seen:
2026-01-26T02:42:00Z UTC
Last seen:
2026-01-28T11:46:00Z UTC
Hits:
~100
Detections:
Trojan.JS.SAgent.sb HEUR:Trojan.Script.Generic
Gathering data
Result
Malware family:
obj3ctivity
Score:
  10/10
Tags:
family:obj3ctivity collection discovery execution persistence privilege_escalation stealer
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Browser Information Discovery
Command and Scripting Interpreter: JavaScript
Event Triggered Execution: Netsh Helper DLL
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Wi-Fi Discovery
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Detects Obj3ctivity Stage1
Obj3ctivity family
Obj3ctivity, PXRECVOWEIWOEI
Process spawned unexpected child process
Malware Config
Dropper Extraction:
https://res.cloudinary.com/dxxyxpqxg/image/upload/v1769187753/optimized_MSI_nthgyz.jpg
Malware family:
DnlibLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments