General
-
Target
ASNQSKJPXJLKFXSIEUQYZ.VBS
-
Size
2KB
-
Sample
220428-hgxyxsbcb6
-
MD5
f04ca5c16f111ab69293045badd53ad9
-
SHA1
1184fafe345b6f79d6a28d87ef957d7f96b76f52
-
SHA256
00b3ede6f9c3073b02afc09611974bdc4765400ac8c039d620679083b88f63fe
-
SHA512
f07b185f0b78ff3962767a7f2d85957ca9057ee049fdf90d041bd405dcc23fe2a79c71143fde8b907153942be9525941af7ffc2d9e25f6bf1717cb43990f200b
Static task
static1
Behavioral task
behavioral1
Sample
ASNQSKJPXJLKFXSIEUQYZ.vbs
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ASNQSKJPXJLKFXSIEUQYZ.vbs
Resource
win10v2004-20220414-en
Malware Config
Extracted
nworm
v0.3.8
hnahmoneu.duckdns.org:6391
30896040
Targets
-
-
Target
ASNQSKJPXJLKFXSIEUQYZ.VBS
-
Size
2KB
-
MD5
f04ca5c16f111ab69293045badd53ad9
-
SHA1
1184fafe345b6f79d6a28d87ef957d7f96b76f52
-
SHA256
00b3ede6f9c3073b02afc09611974bdc4765400ac8c039d620679083b88f63fe
-
SHA512
f07b185f0b78ff3962767a7f2d85957ca9057ee049fdf90d041bd405dcc23fe2a79c71143fde8b907153942be9525941af7ffc2d9e25f6bf1717cb43990f200b
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-