MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 eebf592f1161b2170c9dcc5d2378d11b30e8f47943bf0699898287199e8018bb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 5
| SHA256 hash: | eebf592f1161b2170c9dcc5d2378d11b30e8f47943bf0699898287199e8018bb |
|---|---|
| SHA3-384 hash: | 967117226fd87e4e231d5b31955eec04f9f794736aed105641c223e4bd0ac077617a154b58546028d61a051e5c888e50 |
| SHA1 hash: | ea4413893d12f2ceddf9239482d6f697fbea044e |
| MD5 hash: | 943087d3d67af8e02365a42ff54561e2 |
| humanhash: | west-monkey-early-cola |
| File name: | file |
| Download: | download sample |
| File size: | 778 bytes |
| First seen: | 2026-02-21 01:52:32 UTC |
| Last seen: | 2026-02-21 01:56:20 UTC |
| File type: | |
| MIME type: | text/x-msdos-batch |
| ssdeep | 12:wnhtEc9WXWB5o3+qsdKYMFKIeofNtQeoJ+y6AeofLz7eoBAhBeoB+yMNleoDIbOt:wnEc92WBq3rsLMn6z6WLzCzIhq67ou3 |
| TLSH | T11E0161DA374A51D221A247846EBD048FEF1E820B1E41EC40BD1EB6647C18EE77E1E142 |
| Magika | batch |
| Reporter | |
| Tags: | bat dropped-by-amadey fbf543 |
Intelligence
File Origin
# of uploads :
12
# of downloads :
120
Origin country :
USVendor Threat Intelligence
Malware configuration found for:
BatchScript
Details
BatchScript
varying reportable information from embedded commands and any observed URLs
Verdict:
Malicious
Score:
92.5%
Tags:
shell spawn sage
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
expand fingerprint lolbin msiexec timeout wscript
Verdict:
Clean
File Type:
unix shell
Score:
6%
Verdict:
Benign
File Type:
SCRIPT
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
7/10
Tags:
defense_evasion discovery installer persistence privilege_escalation spyware stealer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
NTFS ADS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Inno Setup is an open-source installation builder for Windows applications.
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Time Discovery
Drops file in Program Files directory
Drops file in Windows directory
Subvert Trust Controls: Mark-of-the-Web Bypass
Suspicious use of SetThreadContext
Adds Run key to start application
Drops desktop.ini file(s)
Enumerates connected drives
Checks computer location settings
Event Triggered Execution: Component Object Model Hijacking
Executes dropped EXE
Loads dropped DLL
Modifies file permissions
Reads user/profile data of web browsers
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
bat eebf592f1161b2170c9dcc5d2378d11b30e8f47943bf0699898287199e8018bb
(this sample)
Dropped by
Amadey
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.