General
-
Target
EncKAO.vbs
-
Size
3KB
-
Sample
220222-xr3z9aceh6
-
MD5
fa584c2b021aed55aff0c764aee1cff0
-
SHA1
327e83c2886c42896804ab87ca6996cb621e9b71
-
SHA256
1b956ea6626165956ea897d431801376e7189f96e149de1b2ee2fed6944a38b2
-
SHA512
a3db7960aa642cd61f499bda0f5892d2b7f939a65252842651472e963ca24ae9ebc7e51cb95e5c424b5dc8b0316333268edb902bb1be713621e4e11c5ecbe18e
Static task
static1
Behavioral task
behavioral1
Sample
EncKAO.vbs
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
EncKAO.vbs
Resource
win10v2004-en-20220112
Malware Config
Extracted
nworm
v0.3.8
nyanmoj.duckdns.org:5057
moneyhope81.duckdns.org:5057
cb2d3cba
Targets
-
-
Target
EncKAO.vbs
-
Size
3KB
-
MD5
fa584c2b021aed55aff0c764aee1cff0
-
SHA1
327e83c2886c42896804ab87ca6996cb621e9b71
-
SHA256
1b956ea6626165956ea897d431801376e7189f96e149de1b2ee2fed6944a38b2
-
SHA512
a3db7960aa642cd61f499bda0f5892d2b7f939a65252842651472e963ca24ae9ebc7e51cb95e5c424b5dc8b0316333268edb902bb1be713621e4e11c5ecbe18e
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-