General
-
Target
edf3b71d1f4e7adae5b58a8f3f865882b5851d3d5e6ef142643eb3ea2066efe1
-
Size
16KB
-
Sample
220128-v7dzyshfh7
-
MD5
ae5fd104186c3551b922492de895edf1
-
SHA1
8022a8078be2a8f96cc5d12e3fe5575a70c88c72
-
SHA256
edf3b71d1f4e7adae5b58a8f3f865882b5851d3d5e6ef142643eb3ea2066efe1
-
SHA512
ffb411fb4bf7fdaaea50e2c1fb5f65fd7702b09b6640ae4266f4412101b3910efc156f349af48b060501db45d20ca96f609d9612eab5e55e2b4578f3fe548e5b
Static task
static1
Behavioral task
behavioral1
Sample
edf3b71d1f4e7adae5b58a8f3f865882b5851d3d5e6ef142643eb3ea2066efe1.vbs
Resource
win7-en-20211208
Malware Config
Targets
-
-
Target
edf3b71d1f4e7adae5b58a8f3f865882b5851d3d5e6ef142643eb3ea2066efe1
-
Size
16KB
-
MD5
ae5fd104186c3551b922492de895edf1
-
SHA1
8022a8078be2a8f96cc5d12e3fe5575a70c88c72
-
SHA256
edf3b71d1f4e7adae5b58a8f3f865882b5851d3d5e6ef142643eb3ea2066efe1
-
SHA512
ffb411fb4bf7fdaaea50e2c1fb5f65fd7702b09b6640ae4266f4412101b3910efc156f349af48b060501db45d20ca96f609d9612eab5e55e2b4578f3fe548e5b
-
Blocklisted process makes network request
-
Drops startup file
-