General
-
Target
skivesvamps.vbs
-
Size
193KB
-
Sample
230114-jcyv4acc82
-
MD5
7b458417e456edfb8816b9f063dd7f4a
-
SHA1
c42d1ff212085b0bd1a150b1e4e0cca2d7cf0dfb
-
SHA256
097eb0cafefed7ddcab95345b850b7f8fa2ba518068275225d9b6a313e1f3491
-
SHA512
da58b88ee2a7af27061808331f9fd2d14bf8cb6cc94099f7b7effecfd376e7d6a577d475ac04b0c4ce38417a8110daa9d7e63851da1223d343b4c6701e51782b
-
SSDEEP
6144:9vsgtPU635A3VxHwQA4hCLx4kjjrPEZp95g+Z/TugoVD9EwM8YmhCXo+v9kaRKZv:B9v35ElxXhCLxdPP8/6
Static task
static1
Behavioral task
behavioral1
Sample
skivesvamps.vbs
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
skivesvamps.vbs
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
skivesvamps.vbs
-
Size
193KB
-
MD5
7b458417e456edfb8816b9f063dd7f4a
-
SHA1
c42d1ff212085b0bd1a150b1e4e0cca2d7cf0dfb
-
SHA256
097eb0cafefed7ddcab95345b850b7f8fa2ba518068275225d9b6a313e1f3491
-
SHA512
da58b88ee2a7af27061808331f9fd2d14bf8cb6cc94099f7b7effecfd376e7d6a577d475ac04b0c4ce38417a8110daa9d7e63851da1223d343b4c6701e51782b
-
SSDEEP
6144:9vsgtPU635A3VxHwQA4hCLx4kjjrPEZp95g+Z/TugoVD9EwM8YmhCXo+v9kaRKZv:B9v35ElxXhCLxdPP8/6
Score10/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-