MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d45d2bd7ac43796f2087198349fe8817f6aaf48484a4b356bd61a76a9631b740. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 9
| SHA256 hash: | d45d2bd7ac43796f2087198349fe8817f6aaf48484a4b356bd61a76a9631b740 |
|---|---|
| SHA3-384 hash: | e2d6adc50899cf8d91b001da23a8639c9b5b99b2e689dfc71bdda8b8f943d4149a3d7fa2a48483bed6f0b7ef29d6dd0a |
| SHA1 hash: | 1d18e9adf579fdf62f819c700e09bbb6863016c3 |
| MD5 hash: | fb49c7a1dd4185a21e27f13bd77df648 |
| humanhash: | mirror-beryllium-utah-failed |
| File name: | fb49c7a1dd4185a21e27f13bd77df648.bat |
| Download: | download sample |
| File size: | 461 bytes |
| First seen: | 2024-12-10 17:02:13 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | text/x-msdos-batch |
| ssdeep | 12:wmMDys81kkGr5ZDRN3is81kkGVX5OQ981kvYX53RP:wmMDXRrLRtHRxUkvYX53RP |
| TLSH | T19EF027330111380A9F1AC53AC0017340A217F5868D0EA5A302FA8D251D87063CBEBADE |
| Magika | batch |
| Reporter | |
| Tags: | bat |
Intelligence
File Origin
# of uploads :
1
# of downloads :
78
Origin country :
NLVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
fb49c7a1dd4185a21e27f13bd77df648.bat
Verdict:
Malicious activity
Analysis date:
2024-12-10 17:06:49 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
93.3%
Tags:
shell virus sage
Result
Verdict:
Clean
Maliciousness:
Behaviour
Launching a process
Сreating synchronization primitives
DNS request
Connection attempt
Creating a window
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
powershell powershell
Verdict:
Malicious
Labled as:
PowerShell/TrojanDownloader.Agent
Result
Verdict:
SUSPICIOUS
Details
Hidden Powershell
Detected a pivot to Powershell that utilizes commonly nefarious attributes such as '-windowstyle hidden'.
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
68 / 100
Signature
AI detected suspicious sample
Antivirus detection for URL or domain
Loading BitLocker PowerShell Module
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Behaviour
Behavior Graph:
Score:
1%
Verdict:
Benign
File Type:
SCRIPT
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
8/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
bat d45d2bd7ac43796f2087198349fe8817f6aaf48484a4b356bd61a76a9631b740
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.