General
-
Target
ANVJYRGCEHLJVEQHRRQKR.VBS
-
Size
5KB
-
Sample
220304-x3s97affe5
-
MD5
b8e6f98016f0cbb8ab5b6d8699538648
-
SHA1
fd72b20ec5ecf894454f319808582b43b769df05
-
SHA256
9841a5ee76188c7c50f2438e125fa6d60416704e7d40885571491cec4729dd90
-
SHA512
c67f7254b27a61e1a674e64f7aab56c1ee0aaeebcfe451343d8375e687516bfad6e9d002039d446b5955c28a13a46741ba00d72a5f25de9c2dc32e76f769d6f3
Static task
static1
Behavioral task
behavioral1
Sample
ANVJYRGCEHLJVEQHRRQKR.vbs
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ANVJYRGCEHLJVEQHRRQKR.vbs
Resource
win10v2004-en-20220112
Malware Config
Extracted
https://rebrand.ly/rlzgijk
Extracted
nworm
v0.3.8
nyanwmoney.duckdns.org:8891
594274bc
Targets
-
-
Target
ANVJYRGCEHLJVEQHRRQKR.VBS
-
Size
5KB
-
MD5
b8e6f98016f0cbb8ab5b6d8699538648
-
SHA1
fd72b20ec5ecf894454f319808582b43b769df05
-
SHA256
9841a5ee76188c7c50f2438e125fa6d60416704e7d40885571491cec4729dd90
-
SHA512
c67f7254b27a61e1a674e64f7aab56c1ee0aaeebcfe451343d8375e687516bfad6e9d002039d446b5955c28a13a46741ba00d72a5f25de9c2dc32e76f769d6f3
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-