General
-
Target
presentation#_76325.vbs
-
Size
1.2MB
-
Sample
200602-xxys2kh3sx
-
MD5
ee4c58983f325bb00a5d04d6c5e41b91
-
SHA1
8284f45c6af2757db6e4046de697ecf38858b174
-
SHA256
a31d0d59f61aeb7a42378ae39255fec0072b65b28af2ed4097662a53132a36c2
-
SHA512
c3f371661d0f1ba846f714fa9c7b7a34066af1cb0c42ae72a9fb77d0f6c604f2b43f3c84b83bac67d84c754c387fe7f4ce17fb4aec9974ad5e45077a99f0672c
Static task
static1
Behavioral task
behavioral1
Sample
presentation#_76325.vbs
Resource
win7v200430
Behavioral task
behavioral2
Sample
presentation#_76325.vbs
Resource
win10v200430
Malware Config
Targets
-
-
Target
presentation#_76325.vbs
-
Size
1.2MB
-
MD5
ee4c58983f325bb00a5d04d6c5e41b91
-
SHA1
8284f45c6af2757db6e4046de697ecf38858b174
-
SHA256
a31d0d59f61aeb7a42378ae39255fec0072b65b28af2ed4097662a53132a36c2
-
SHA512
c3f371661d0f1ba846f714fa9c7b7a34066af1cb0c42ae72a9fb77d0f6c604f2b43f3c84b83bac67d84c754c387fe7f4ce17fb4aec9974ad5e45077a99f0672c
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blacklisted process makes network request
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-