MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f87dcded559755d3fb76f0ed3e861799294630844305128276fb1b6452ed7061. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ResolverRAT


Vendor detections: 8


Intelligence 8 IOCs YARA 4 File information Comments

SHA256 hash: f87dcded559755d3fb76f0ed3e861799294630844305128276fb1b6452ed7061
SHA3-384 hash: 083d24bf433075bfc791874269fe7acab39a92ad26a62eb05b6395b67d6c63f0fe368f362bca162527c4b0fd914b30e2
SHA1 hash: c93a2c2137f94698d054e94f1ffeae8abf51dac5
MD5 hash: f7f0ee31a5c0db17656414b0a9b4389e
humanhash: triple-oranges-august-helium
File name:Form_1768322935.js
Download: download sample
Signature ResolverRAT
File size:4'217'575 bytes
First seen:2026-01-14 17:13:30 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 384:Ktqaqzs8BDBGex2C7MKUw/qEwOcnX7s5aWJ+UXrlQS4R2OKiLh+jgL7lr3q8Us28:kqzFBl2CYO6ziLap/
TLSH T11516D3EB19BDB425CD6500115E296D4EF1E3214F894568CA7FC0A1F87BEA0D7CE2EDA0
Magika javascript
Reporter Anonymous
Tags:js ResolverRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
113
Origin country :
US US
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
96.5%
Tags:
obfuscate xtreme virus
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm base64 base64 evasive fingerprint obfuscated obfuscated overlay powershell repaired
Verdict:
Malicious
File Type:
js
First seen:
2026-01-13T17:45:00Z UTC
Last seen:
2026-01-15T12:48:00Z UTC
Hits:
~10
Detections:
Trojan.JS.SAgent.sb HEUR:Trojan-Downloader.Script.Generic HEUR:Trojan.Script.Generic
Verdict:
inconclusive
YARA:
1 match(es)
Result
Malware family:
n/a
Score:
  10/10
Tags:
execution persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: JavaScript
Adds Run key to start application
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Process spawned unexpected child process
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments