MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e8207bf35b5e829ba7ffad3d65c9702ce0582eb28d600b9ef3af16337502dc84. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: e8207bf35b5e829ba7ffad3d65c9702ce0582eb28d600b9ef3af16337502dc84
SHA3-384 hash: e38a14f860254bbc194eb60948241a2d5aed5b39c28619a64568d3941bfc2b8927de0ca529d7737e9bb27ae9965b74c1
SHA1 hash: 6feb326eaacbf7e9fe38eb4d37a5919166253966
MD5 hash: f4dcac746cc9f99727ec425284bc28da
humanhash: helium-east-helium-green
File name:port-check.ps1
Download: download sample
File size:1'085 bytes
First seen:2025-07-17 05:50:40 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 12:pSYfXm4MGiREvT/LF0zEPiThsIZWB0WsDVm6xhwEMDlAhMjU9RaC8:OGbzF0zVsM2sDVzVQIQLC8
TLSH T16711C71071078123A6F3233B688AA3D8EF12912B6467040935CCC2CC6FB6D1491BCE1E
Magika powershell
Reporter abuse_ch
Tags:ps1

Intelligence


File Origin
# of uploads :
1
# of downloads :
33
Origin country :
SE SE
Vendor Threat Intelligence
Verdict:
Suspicious
Score:
50%
Tags:
malware
Result
Threat name:
n/a
Detection:
suspicious
Classification:
n/a
Score:
25 / 100
Signature
Joe Sandbox ML detected suspicious sample
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1738557 Sample: port-check.ps1 Startdate: 17/07/2025 Architecture: WINDOWS Score: 25 10 Joe Sandbox ML detected suspicious sample 2->10 6 powershell.exe 20 2->6         started        process3 process4 8 conhost.exe 6->8         started       
Gathering data
Threat name:
Text.Trojan.Generic
Status:
Suspicious
First seen:
2025-01-11 07:02:17 UTC
File Type:
Text (PowerShell)
AV detection:
4 of 23 (17.39%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PowerShell (PS) ps1 e8207bf35b5e829ba7ffad3d65c9702ce0582eb28d600b9ef3af16337502dc84

(this sample)

  
Delivery method
Distributed via web download

Comments