MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 df38b9a5d79310c84b58c90a6cce133176c8d3ad9856de278c05db977eae8c1e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: df38b9a5d79310c84b58c90a6cce133176c8d3ad9856de278c05db977eae8c1e
SHA3-384 hash: c99fd05f18158d884ea5833e1eb5fd06c1095966e5a4544af983203978877200798f2aaf7362d72aef0f494d4ac8cc42
SHA1 hash: 42c19084280ab24eb2c187c9012d08aa82a56025
MD5 hash: 39d2e1ffe5c0fbb3bbc143f9efdb76d4
humanhash: island-friend-winter-may
File name:suspek2pdf.zip
Download: download sample
File size:2'036 bytes
First seen:2026-03-16 03:46:19 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 48:9/4AJn0K/v6BL/k6BCZSdo8NSIp6QXeii5XvYlh1tu5omY4HshY:np/ebDeSfTQQuiblh1tLmYw
TLSH T17341F8844D2B12E4E461193ED9356E3F4FC89A687E766B9F2E300815D2D3E940584B7A
Magika zip
Reporter nat
Tags:zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
55
Origin country :
TH TH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:7351025535_16032026·pdf.bat
File size:3'058 bytes
SHA256 hash: 522421b282e3f58b885c37b5389c675b4c994df1362f9e85ed1a360a35b65d82
MD5 hash: 89ac7af1d81bba93afa6e70613644f7c
MIME type:text/plain
Vendor Threat Intelligence
Verdict:
Malicious
Score:
81.4%
Tags:
shell virus sage
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 cloudeye encrypted obfuscated powershell powershell
Result
Verdict:
SUSPICIOUS
Details
Hidden Powershell
Detected a pivot to Powershell that utilizes commonly nefarious attributes such as '-windowstyle hidden'.
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
Zip Archive
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
Contacts third-party web service commonly abused for C2
Badlisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments