General
-
Target
KVDKGYBAXAKQX_PAYMENT_COPY.VBS
-
Size
9KB
-
Sample
220309-sb6zracdbp
-
MD5
8ade0a04317db340d7dcdc9a4b32c795
-
SHA1
30350a6e2339507039e86a68a99958b1d9dea157
-
SHA256
1aa032a3d316f19de0c0946185eb7331aa1270d52882550c867eae1ce540ade1
-
SHA512
7572ebc9ae53a8639285b849fa972d4f40eaf3a923e43430f85337a73810bdeb487d0231ffdb4f0391442c2acdb244ab03063ed0ddc78cd12248431476c2cdaf
Static task
static1
Behavioral task
behavioral1
Sample
KVDKGYBAXAKQX_PAYMENT_COPY.vbs
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
KVDKGYBAXAKQX_PAYMENT_COPY.vbs
Resource
win10v2004-en-20220113
Malware Config
Extracted
https://transfer.sh/get/gnXbHK/ServerSHJWIJW8292.txt
Extracted
nworm
v0.3.8
nyanwmoney.duckdns.org:8891
594274bc
Targets
-
-
Target
KVDKGYBAXAKQX_PAYMENT_COPY.VBS
-
Size
9KB
-
MD5
8ade0a04317db340d7dcdc9a4b32c795
-
SHA1
30350a6e2339507039e86a68a99958b1d9dea157
-
SHA256
1aa032a3d316f19de0c0946185eb7331aa1270d52882550c867eae1ce540ade1
-
SHA512
7572ebc9ae53a8639285b849fa972d4f40eaf3a923e43430f85337a73810bdeb487d0231ffdb4f0391442c2acdb244ab03063ed0ddc78cd12248431476c2cdaf
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-