MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e96b1979a0e64f67d1071a97c4c6f4f7c97f192c821e46e9ae8e3aa8d48d87d8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: e96b1979a0e64f67d1071a97c4c6f4f7c97f192c821e46e9ae8e3aa8d48d87d8
SHA3-384 hash: 5187157e596232c586862c9ac2818dc5cd4cda395f8ef58e3edf78425239748ca68f82f1134dbc5a775a59b7415e2b49
SHA1 hash: 8f002cd11518ced0fbb66d708974dc1fedb6d6ec
MD5 hash: f9085740df4dacbe1194cdee36ad155d
humanhash: mirror-harry-pizza-purple
File name:bakah.bat
Download: download sample
File size:1'412 bytes
First seen:2025-10-03 22:14:16 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/x-msdos-batch
ssdeep 24:wT/2MNyPy2s24Ia/JTTWmXWbOGIGbbJIsboxVKHELxVKHELxVKOELxVKGEwsaVCu:o/2TloBhBXujpJTMOENyENLENrEwscpZ
TLSH T11B21092B291A8C0A5531A7E4C9671842E39EC6AB0C06EFCCF6DA30107C6B30B122C6DD
Magika batch
Reporter smica83
Tags:bat

Intelligence


File Origin
# of uploads :
1
# of downloads :
53
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
bakah.bat
Verdict:
No threats detected
Analysis date:
2025-10-03 22:17:16 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
dropper shell sage
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-10-03T19:46:00Z UTC
Last seen:
2025-10-03T20:07:00Z UTC
Hits:
~10
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
80 / 100
Signature
Creates HTML files with .exe extension (expired dropper behavior)
Sigma detected: Connection Initiated Via Certutil.EXE
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Legitimate Application Dropped Executable
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Uses cmd line tools excessively to alter registry or file data
Behaviour
Behavior Graph:
Threat name:
Text.Trojan.Generic
Status:
Suspicious
First seen:
2025-10-03 22:14:38 UTC
File Type:
Text (Batch)
AV detection:
3 of 38 (7.89%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
defense_evasion trojan
Behaviour
Runs net.exe
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Windows security bypass
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments