MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 df90b858ebf82740ce134fb5917becbb3385f4dfc36cbe28d6e90709df01f065. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: df90b858ebf82740ce134fb5917becbb3385f4dfc36cbe28d6e90709df01f065
SHA3-384 hash: 2a5896ada21a97dd0c8264a67fb3f7916ead19e5c6617dd839dcc2cff07e1d5c8f84586beb41933a72393fc7aa16bf12
SHA1 hash: dd1b37d276ed450ae055e228fb19b64f3c9db778
MD5 hash: 64bba2b2dd21188ee6cb1c0076ee014b
humanhash: tennessee-nevada-one-lion
File name:ps1010.ps1
Download: download sample
File size:99'508 bytes
First seen:2024-11-22 08:17:50 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 1536:1XsJ4sYiWUUchrHNF7HJGm8o18lWW80J8SasOaSS:1Xs+sBNH/pAo1XySkj
TLSH T1BBA37E398A867FF6172E2848950C6D401D983AA793699246DB4CF1737ADE430CFBC4BD
Magika powershell
Reporter Joker
Tags:malware ps1

Intelligence


File Origin
# of uploads :
1
# of downloads :
87
Origin country :
GR GR
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.9%
Tags:
virus gates hllp
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
obfuscated virus
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1560746 Sample: ps1010.ps1 Startdate: 22/11/2024 Architecture: WINDOWS Score: 48 10 Multi AV Scanner detection for submitted file 2->10 6 powershell.exe 11 2->6         started        process3 process4 8 conhost.exe 6->8         started       
Threat name:
Win32.Virus.Pardona
Status:
Malicious
First seen:
2024-11-19 17:13:00 UTC
File Type:
Text
AV detection:
22 of 38 (57.89%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PowerShell (PS) ps1 df90b858ebf82740ce134fb5917becbb3385f4dfc36cbe28d6e90709df01f065

(this sample)

  
Delivery method
Distributed via web download

Comments