MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cf8755956735075fe3a8e37d117500f459b2c8ce97dd759c5d3334223c84d582. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 1


Intelligence 1 IOCs YARA File information Comments

SHA256 hash: cf8755956735075fe3a8e37d117500f459b2c8ce97dd759c5d3334223c84d582
SHA3-384 hash: 620fe7313b63c026515d0a14eca23a91b9a015894df875137cd93df5db5fdf4f9229362975d318420263430e289edad6
SHA1 hash: ba478a5d587fea5f94c6cd7ced37a000ec1f6499
MD5 hash: cf140502f37e117c5993c246893496e9
humanhash: mango-finch-foxtrot-nebraska
File name:malicious.py
Download: download sample
File size:9'970 bytes
First seen:2021-05-28 05:32:07 UTC
Last seen:Never
File type:
MIME type:text/plain
ssdeep 192:2UbOQ6YrichVsHW+xuH7BK+i6nRfiztAjV6MoLdSsNllsNC8zHOY7Ly712lreJrr:2U9YRuH7IinToLdXNUNxTap+WXAM0W
TLSH 9022A5457E99D1A8435B60BDBD3AD54079309267210D6D34FAEC46C87FC33A2EAF4389
Reporter xme
Tags:c2 powershell sansisc

Intelligence


File Origin
# of uploads :
1
# of downloads :
300
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments