MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d37789af995529e2c3bbb9c4ed8fab17c457b30e75bff13765f3e88c4b4777fd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PXRECVOWEIWOEI


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: d37789af995529e2c3bbb9c4ed8fab17c457b30e75bff13765f3e88c4b4777fd
SHA3-384 hash: 6247f3b394f8da9aafd51c78fa2a35f319c1f4b34efed9f19f47d1c8142f4825741ca0d948a7c229f6fbc39ec5a1a524
SHA1 hash: 8468571060a621c0d55127df35ba6cf7395b3fea
MD5 hash: 5c24bc73025b64e285f118c49420b6d1
humanhash: maryland-tennessee-carpet-lactose
File name:BOOKING_GUEST_LIST.js
Download: download sample
Signature PXRECVOWEIWOEI
File size:4'658'395 bytes
First seen:2026-01-12 15:16:47 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 384:ZSLBGZH8LLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLg:l
Threatray 88 similar samples on MalwareBazaar
TLSH T1DC26D69047181905E5BFB6862ED4F0AE9AA867FC1427283E360933C1FE7116DCD7BB91
Magika javascript
Reporter Anonymous
Tags:js PXRECVOWEIWOEI

Intelligence


File Origin
# of uploads :
1
# of downloads :
108
Origin country :
US US
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
91.7%
Tags:
obfuscate xtreme shell
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm base64 base64 fingerprint obfuscated obfuscated overlay powershell repaired
Verdict:
Malicious
Labled as:
JS_TrojanDownloader_Agent_ADUF
Verdict:
Malicious
File Type:
js
First seen:
2026-01-11T16:55:00Z UTC
Last seen:
2026-01-14T12:48:00Z UTC
Hits:
~100
Detections:
Trojan.JS.SAgent.sb HEUR:Trojan.Script.SAgent.gen HEUR:Trojan.Script.Generic
Gathering data
Threat name:
Script-JS.Trojan.Generic
Status:
Suspicious
First seen:
2026-01-11 19:15:09 UTC
File Type:
Binary
AV detection:
11 of 36 (30.56%)
Threat level:
  5/5
Result
Malware family:
obj3ctivity
Score:
  10/10
Tags:
family:obj3ctivity collection discovery execution persistence privilege_escalation stealer
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Browser Information Discovery
Command and Scripting Interpreter: JavaScript
Event Triggered Execution: Netsh Helper DLL
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Wi-Fi Discovery
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Detects Obj3ctivity Stage1
Obj3ctivity family
Obj3ctivity, PXRECVOWEIWOEI
Process spawned unexpected child process
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments