MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fe7dd0edd4734a9c605c20d5963d95ebc33da9b3f908c9d62b0f68e125ee12d8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CaminhoLoader


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: fe7dd0edd4734a9c605c20d5963d95ebc33da9b3f908c9d62b0f68e125ee12d8
SHA3-384 hash: 318295bb9e68e5fc9271282a2b4410fd9f00caa96d657b95c9ed68bdf581aa739549e8fd6fd951dca2749b001dda2b60
SHA1 hash: ea2c10915357284552202b4331be34a7d4f1770b
MD5 hash: cdaf4c508c0533c4a3bd94c9229cb1ec
humanhash: south-burger-artist-paris
File name:documents_454857.js
Download: download sample
Signature CaminhoLoader
File size:4'607'129 bytes
First seen:2026-02-09 13:13:58 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 48:vttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttO:rJZbB7JGw5nwtiHWSLhKkDDEmls6Udz
Threatray 27 similar samples on MalwareBazaar
TLSH T10F2601E971AE889041632DE1D3F930C6FF8A16A913C1370C66DBF3D5A4C669DC936392
Magika txt
Reporter smica83
Tags:CaminhoLoader js

Intelligence


File Origin
# of uploads :
1
# of downloads :
118
Origin country :
HU HU
Vendor Threat Intelligence
No detections
Verdict:
Malicious
File Type:
js
First seen:
2026-02-09T10:26:00Z UTC
Last seen:
2026-02-09T10:44:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan.Script.Generic Trojan.JS.SAgent.sb
Result
Threat name:
Caminho Loader, XWorm
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Creates processes via WMI
Found malware configuration
JavaScript source code contains functionality to generate code involving a shell, file or stream
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: PowerShell Base64 Encoded Reflective Assembly Load
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Suspicious execution chain found
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Yara detected Caminho Loader
Yara detected Powershell decode and execute
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1866071 Sample: documents_454857.js Startdate: 09/02/2026 Architecture: WINDOWS Score: 100 28 screenshot.finance 2->28 30 nodetectonn.ddns.com.br 2->30 32 4 other IPs or domains 2->32 40 Suricata IDS alerts for network traffic 2->40 42 Found malware configuration 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 19 other signatures 2->46 9 wscript.exe 1 2->9         started        12 powershell.exe 15 16 2->12         started        15 powershell.exe 17 17 2->15         started        signatures3 process4 dnsIp5 48 Suspicious powershell command line found 9->48 50 Wscript starts Powershell (via cmd or directly) 9->50 52 Windows Scripting host queries suspicious COM object (likely to drop second stage) 9->52 56 2 other signatures 9->56 34 nodetectonn.ddns.com.br 128.90.113.1, 49720, 49724, 7000 PHMGMT-AS1US United States 12->34 36 ip-api.com 208.95.112.1, 49723, 80 TUT-ASUS United States 12->36 38 3 other IPs or domains 12->38 54 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 12->54 18 conhost.exe 12->18         started        26 C:\Users\Public\Downloads\jUvdwq2hOD.js, Unicode 15->26 dropped 20 wscript.exe 15->20         started        file6 signatures7 process8 process9 22 powershell.exe 13 20->22         started        process10 24 conhost.exe 22->24         started       
Gathering data
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2026-02-09 07:59:00 UTC
File Type:
Binary
AV detection:
6 of 24 (25.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: JavaScript
System Location Discovery: System Language Discovery
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Process spawned unexpected child process
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments