General
-
Target
vbc.exe
-
Size
1.2MB
-
Sample
230213-dpafdaad97
-
MD5
9f80ff5c4d8509510d1d8cdef4eb3209
-
SHA1
dfb89f61fa28f38faa839cfdf15330b1407449c5
-
SHA256
9073ce0a4be6a6577b68949bae119ecc7c0449e4dcc906dd01845731dcef0792
-
SHA512
5f9a1f543dd6d7c7dc873cf6740f084fb7040333d52cebb92c2f00ea322ede667e5e7dd38802747094290dee5a46b6f7aa9817c9c04d7cf5b650637ae863be6b
-
SSDEEP
12288:cwVQOfWou9XRrIcQ5etzho8MKYan6ENu8avxnGQ5bAUW4zmLVGSh85nFRj/etuDZ:gj/mi3/N4cZYhjYXSeiiC
Static task
static1
Behavioral task
behavioral1
Sample
vbc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
vbc.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
vbc.exe
-
Size
1.2MB
-
MD5
9f80ff5c4d8509510d1d8cdef4eb3209
-
SHA1
dfb89f61fa28f38faa839cfdf15330b1407449c5
-
SHA256
9073ce0a4be6a6577b68949bae119ecc7c0449e4dcc906dd01845731dcef0792
-
SHA512
5f9a1f543dd6d7c7dc873cf6740f084fb7040333d52cebb92c2f00ea322ede667e5e7dd38802747094290dee5a46b6f7aa9817c9c04d7cf5b650637ae863be6b
-
SSDEEP
12288:cwVQOfWou9XRrIcQ5etzho8MKYan6ENu8avxnGQ5bAUW4zmLVGSh85nFRj/etuDZ:gj/mi3/N4cZYhjYXSeiiC
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-