MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e6a1fb402b80ab63c6f5eff4c25e4eae74ccf79d0a8f2aafff84b85e02301b52. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Guildma


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: e6a1fb402b80ab63c6f5eff4c25e4eae74ccf79d0a8f2aafff84b85e02301b52
SHA3-384 hash: 3a7a504480acbc6953f2c9f52928d3ccf6e3c328d9668ae6af4d9343fadd7ad409a4f2df3b2eda8d69ae5a420a732245
SHA1 hash: 75bf05268ea775b5bc04e57948cf3dcb04c75f51
MD5 hash: fc5cf4deb7164d8b243933d600862615
humanhash: november-glucose-spring-undress
File name:guildma.jse
Download: download sample
Signature Guildma
File size:6'655 bytes
First seen:2025-12-30 15:27:40 UTC
Last seen:Never
File type:JScript (JSE) jse
MIME type:text/xml
ssdeep 192:+m9TOW3rAX4/bY6ULaMC4MwwhuKTzhiGsQEtPay:hdOiWnLfOwwYKxED
TLSH T19AD172ABB05F91AB017301190A398180BA1DE5EBF46DEAF57529F17CD3F0A08B1D4425
Magika xml
Reporter abuse_ch
Tags:ascii Astaroth guildma jse xml

Intelligence


File Origin
# of uploads :
1
# of downloads :
128
Origin country :
CH CH
Vendor Threat Intelligence
No detections
Verdict:
Malicious
File Type:
sct
First seen:
2025-12-30T12:32:00Z UTC
Last seen:
2025-12-30T23:57:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan.Script.Generic
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Multi AV Scanner detection for submitted file
Sigma detected: WScript or CScript Dropper
Behaviour
Behavior Graph:
Threat name:
Script-JS.Dropper.Heuristic
Status:
Malicious
First seen:
2025-12-30 15:28:14 UTC
File Type:
Text (XML)
AV detection:
4 of 36 (11.11%)
Threat level:
  2/5
Gathering data
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Guildma

JScript (JSE) jse e6a1fb402b80ab63c6f5eff4c25e4eae74ccf79d0a8f2aafff84b85e02301b52

(this sample)

  
Delivery method
Distributed via web download

Comments