MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dae38bd5289ecd266b6e0c9493854b8c862ca605b51507b9205cf0b2439a6229. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 4 File information Comments

SHA256 hash: dae38bd5289ecd266b6e0c9493854b8c862ca605b51507b9205cf0b2439a6229
SHA3-384 hash: 1f9be2b65b5fa4a82ea50f46bae229bc707d7874210a1f14c9608513d6952494cb897fdd1c5a134012bb8ad38dc23631
SHA1 hash: 89f29a7454ad3443e4dbf55b04a5d0e00c668e55
MD5 hash: 116313c15fb8c24ce750123fc84f076b
humanhash: edward-four-blossom-paris
File name:75444426b22001a81ae52be4c6998a951db25121b4cbc0307105289da8b087dd.zip
Download: download sample
File size:2'542 bytes
First seen:2026-03-17 13:26:56 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 48:9PEmIyRMn0jiiTjGUsr01Bnzt0cp+lKUJUApH1xjBAwoSPlOdhIkakI4cInAOng8:fiejTRzt0cpqKC1xjJtchZI4cMP/
TLSH T159510C079DCE1394C479D7BC0D2EAE154CBD12A0507288C673AF3E14581DE8561B15E2
Magika zip
Reporter JAMESWT_WT
Tags:43-160-214-122 incometax-biz-id liuliu-cyou vbs ywdtwss-icu zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
58
Origin country :
IT IT
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:75444426b22001a81ae52be4c6998a951db25121b4cbc0307105289da8b087dd.vbs
File size:6'708 bytes
SHA256 hash: 75444426b22001a81ae52be4c6998a951db25121b4cbc0307105289da8b087dd
MD5 hash: bb19349761d60699cb2b81c8ec7e61bf
MIME type:text/plain
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.2%
Tags:
obfuscate xtreme overt
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm dropper evasive fingerprint lolbin powershell wscript
Result
Verdict:
SUSPICIOUS
Details
Hidden Powershell
Detected a pivot to Powershell that utilizes commonly nefarious attributes such as '-windowstyle hidden'.
Gathering data
Threat name:
Script-WScript.Trojan.Heuristic
Status:
Malicious
First seen:
2026-03-17 13:27:23 UTC
File Type:
Binary (Archive)
Extracted files:
1
AV detection:
8 of 23 (34.78%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_powershell
Author:daniyyell
Description:Detects suspicious PowerShell activity related to malware execution
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments