MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ed556835173db0074576c71c281f0fffb2c4eb95706a47d01da69056ae16ff72. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: ed556835173db0074576c71c281f0fffb2c4eb95706a47d01da69056ae16ff72
SHA3-384 hash: 6236c963f6885f0cc96cf3d5c81e670ce703e70018e4aa9ed3b410c273f41e0cc6d392858c1a41a4a56f9d543c05f809
SHA1 hash: ed9fc95022922238cd580ef5218b5a39961a9c68
MD5 hash: bed95f90b94b6852ed6719ca53fed133
humanhash: leopard-dakota-maryland-fix
File name:31agosto.vbs
Download: download sample
File size:1'881'220 bytes
First seen:2026-04-16 07:48:58 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 12288:TDoWu+4VIDTcqPlYuQes6Z8sPX+9AJK00Qod:foWu+4VIDTcqcF6Z8sPXiAJ90Qod
TLSH T16895A9041FEB80AE75A37D4045E0525B5BBBF6BBA6758B9F448003CD07F3608525AFBA
TrID 66.6% (.TXT) Text - UTF-16 (LE) encoded (2000/1)
33.3% (.MP3) MP3 audio (1000/1)
Magika vba
Reporter BlinkzSec

Intelligence


File Origin
# of uploads :
1
# of downloads :
70
Origin country :
CZ CZ
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
92.5%
Tags:
obfuscate xtreme shell
Verdict:
Malicious
File Type:
text
First seen:
2026-04-15T13:16:00Z UTC
Last seen:
2026-04-17T19:04:00Z UTC
Hits:
~100
Detections:
Trojan.MSIL.Miner.sb Trojan.MSIL.Crypt.sb Trojan-Downloader.MSIL.Agent.a PDM:Trojan.Win32.Generic HEUR:Trojan-Downloader.Script.Generic Trojan.JS.SAgent.sb Trojan-PSW.Win32.Stealer.sb Trojan-Downloader.JS.Cryptoload.sb HEUR:Trojan.Script.Generic
Gathering data
Threat name:
Win32.Trojan.Kepavll
Status:
Malicious
First seen:
2026-04-15 15:04:02 UTC
File Type:
Text (VBS)
AV detection:
10 of 38 (26.32%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Contacts third-party web service commonly abused for C2
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Process spawned unexpected child process
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments