MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ecf508d91f7e3b17a7211e5e8d48739158cd75844f2caaf9792f95ce7d17516f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 8 File information Comments

SHA256 hash: ecf508d91f7e3b17a7211e5e8d48739158cd75844f2caaf9792f95ce7d17516f
SHA3-384 hash: 5f26f8603390c0582c8ff8cc7b963d154da6d01175ef10b51baf4c292b3d46e6f51eaae5feb6bf7cae0892b60bf41325
SHA1 hash: db8819ae051c965ff77ce86d16ca72f4b54dfc20
MD5 hash: d3ae2d7f49d3235e67b2f15e7d97a0a4
humanhash: maryland-triple-glucose-happy
File name:t.ps1
Download: download sample
File size:13'692 bytes
First seen:2026-04-01 09:31:02 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 384:G5v38JWPShwHgTT38w+6388S38J8PDthwHgTFH3a+n1qqE:E38JW238wx388S38J8w+nlE
TLSH T1AF523F087311626595B26B3CCDC7981DFF3F507B2562421472DDA0802FB6A6ECBA8F99
Magika powershell
Reporter aachum
Tags:dropped-by-OffLoader ps1


Avatar
iamaachum
https://stryper.info/t.ps1

Intelligence


File Origin
# of uploads :
1
# of downloads :
49
Origin country :
ES ES
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
Score:
91.7%
Tags:
ransomware virus sage
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm base64 evasive expand fingerprint lolbin
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Adds extensions / path to Windows Defender exclusion list (Registry)
AI detected malicious Powershell script
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
Creates files in the system32 config directory
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disable Windows Notification Center
Found suspicious powershell code related to unpacking or dynamic code loading
Inline Python code execution detected
Installs a MSI (Microsoft Installer) remotely
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Performs DNS queries to domains with low reputation
Powershell drops PE file
Sigma detected: PowerShell Download and Execution Cradles
Sigma detected: Suspicious Invoke-WebRequest Execution
Uses cmd line tools excessively to alter registry or file data
Yara detected Powershell download and execute
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1891965 Sample: t.ps1 Startdate: 01/04/2026 Architecture: WINDOWS Score: 100 72 aa.amazingshield.xyz 2->72 74 stryper.info 2->74 76 17 other IPs or domains 2->76 94 Malicious sample detected (through community Yara rule) 2->94 96 Antivirus detection for URL or domain 2->96 98 Yara detected Powershell download and execute 2->98 102 5 other signatures 2->102 10 powershell.exe 19 113 2->10         started        15 msiexec.exe 1001 2->15         started        17 node.exe 2->17         started        19 2 other processes 2->19 signatures3 100 Performs DNS queries to domains with low reputation 72->100 process4 dnsIp5 78 stryper.info 172.67.137.122, 443, 49729 CLOUDFLARENETUS United States 10->78 80 aa.amazingshield.xyz 13.249.141.25, 443, 49841 AMAZON-02US United States 10->80 88 2 other IPs or domains 10->88 56 C:\...\winsound.pyd, PE32+ 10->56 dropped 58 C:\...\vcruntime140_1.dll, PE32+ 10->58 dropped 60 C:\...\vcruntime140.dll, PE32+ 10->60 dropped 68 29 other malicious files 10->68 dropped 112 Uses cmd line tools excessively to alter registry or file data 10->112 114 Found suspicious powershell code related to unpacking or dynamic code loading 10->114 116 Disable Windows Defender notifications (registry) 10->116 118 5 other signatures 10->118 21 reg.exe 1 1 10->21         started        24 reg.exe 1 1 10->24         started        32 5 other processes 10->32 82 nodejs.org 172.66.128.70, 443, 49726 CLOUDFLARENETUS United States 15->82 62 C:\Windows\Installer\MSICFE6.tmp, PE32+ 15->62 dropped 64 C:\Windows\Installer\MSIC516.tmp, PE32+ 15->64 dropped 66 C:\Windows\Installer\MSIC4D7.tmp, PE32+ 15->66 dropped 70 61 other files (none is malicious) 15->70 dropped 34 3 other processes 15->34 90 3 other IPs or domains 17->90 26 cmd.exe 17->26         started        36 2 other processes 17->36 84 crowdstri.com 18.160.200.20, 443, 49842 MIT-GATEWAYSUS United States 19->84 86 sablepointsecurity.com 13.249.141.118, 443, 49731 AMAZON-02US United States 19->86 28 cmd.exe 19->28         started        30 cmd.exe 19->30         started        38 2 other processes 19->38 file6 signatures7 process8 signatures9 106 Adds extensions / path to Windows Defender exclusion list (Registry) 21->106 108 Uses cmd line tools excessively to alter registry or file data 26->108 110 Bypasses PowerShell execution policy 26->110 40 reg.exe 26->40         started        42 powershell.exe 28->42         started        45 conhost.exe 28->45         started        47 reg.exe 30->47         started        49 powershell.exe 36->49         started        process10 dnsIp11 92 d2e7uz1tnz7211.cloudfront.net 143.204.187.46, 443, 49843, 49844 AMAZON-02US United States 42->92 51 powershell.exe 42->51         started        process12 signatures13 104 Creates files in the system32 config directory 51->104 54 conhost.exe 51->54         started        process14
Gathering data
Threat name:
Text.Trojan.Generic
Status:
Suspicious
First seen:
2026-03-26 02:55:17 UTC
File Type:
Text (PowerShell)
AV detection:
5 of 24 (20.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
defense_evasion discovery execution trojan
Behaviour
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Enumerates connected drives
Loads dropped DLL
Use of msiexec (install) with remote resource
Badlisted process makes network request
Modifies Windows Defender notification settings
Malware Config
Dropper Extraction:
https://stryper.info/aa.js
https://www.python.org/ftp/python/3.12.2/python-3.12.2-embed-amd64.zip
https://aa.amazingshield.xyz/33244556546.py
https://x.aegisforgesecurity.com/x.js
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_powershell
Author:daniyyell
Description:Detects suspicious PowerShell activity related to malware execution
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:Detect_Zoom_Invite_malware_RAT_C2
Author:daniyyell
Description:Detects Zoom Invite Call Leading to Malware Hosted in Telegram C2
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:SUSP_PowerShell_Base64_Decode
Author:SECUINFRA Falcon Team
Description:Detects PowerShell code to decode Base64 data. This can yield many FP
Rule name:SUSP_Scheduled_Tasks_Create_From_Susp_Dir
Author:SECUINFRA Falcon Team
Description:Detects a PowerShell Script that creates a Scheduled Task that runs from an suspicious directory
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:WIN_ClickFix_Detection
Author:dogsafetyforeverone
Description:Detects ClickFix social engineering technique using 'Verify you are human' messages and malicious PowerShell commands
Reference:ClickFix social engineering and malicious PowerShell commands

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PowerShell (PS) ps1 ecf508d91f7e3b17a7211e5e8d48739158cd75844f2caaf9792f95ce7d17516f

(this sample)

Comments