General
-
Target
IvHUBr2n.wsf
-
Size
7KB
-
Sample
210609-e8acskbjrj
-
MD5
854655955fd6ad26285ad083cc413602
-
SHA1
e1e1a57d75ea1ef2bcaf37a7c04ed83face11add
-
SHA256
c9704b81ede076637ffb9c981443620588c843475394f45769ea3e9743e54a0a
-
SHA512
7b2061f9281050c9db6aa683735a57f11ec931c38cf627f11115ab2bac4596029030c7f529b0746c61a197353f240bb93a3ea654885d3dd47b6629a6661eb94d
Static task
static1
Behavioral task
behavioral1
Sample
IvHUBr2n.wsf
Resource
win7v20210408
Behavioral task
behavioral2
Sample
IvHUBr2n.wsf
Resource
win10v20210408
Malware Config
Targets
-
-
Target
IvHUBr2n.wsf
-
Size
7KB
-
MD5
854655955fd6ad26285ad083cc413602
-
SHA1
e1e1a57d75ea1ef2bcaf37a7c04ed83face11add
-
SHA256
c9704b81ede076637ffb9c981443620588c843475394f45769ea3e9743e54a0a
-
SHA512
7b2061f9281050c9db6aa683735a57f11ec931c38cf627f11115ab2bac4596029030c7f529b0746c61a197353f240bb93a3ea654885d3dd47b6629a6661eb94d
-
Registers COM server for autorun
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-