General

  • Target

    NEW_ORDER.vbs.zip

  • Size

    13KB

  • Sample

    231012-yz12asbd2z

  • MD5

    c785d67c645dae8bb02d408c109bd63e

  • SHA1

    00e327729e000963dca93f19ee99b6cd00b35cde

  • SHA256

    6e4329af6d09456ca9c0501d9b09750cfaec06973c53046158a8001eda49e60e

  • SHA512

    b933d99c624e34546a892ac4437f97e8a288eba3487f7a1f6d612ce2c036207e69eb1ec533b31dc80b0d003f534fc0d8400ba1d57111535e7dc300d3905d7d73

  • SSDEEP

    192:+o6yU21R119cotOIgJytRb0pfEgYbqAgHIaqRMSmyMZk7hErrwodCX6CSqz5QOHc:t6yUgtcgWfEg6qiauGZghCrwoJqRHLK3

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://uploaddeimagens.com.br/images/004/616/609/original/rump_vbs.jpg?1695408937

exe.dropper

https://uploaddeimagens.com.br/images/004/616/609/original/rump_vbs.jpg?1695408937

Targets

    • Target

      NEW_ORDER.vbs

    • Size

      200KB

    • MD5

      b42f3a12a9a7c9bc5657036af831b4a6

    • SHA1

      c1f760b0be90198dbef71ea99d4680c1a4e53f59

    • SHA256

      ba46446d61f65e10027d120d28022cb6864ba0174c599b23a96b10bd08764699

    • SHA512

      d6908b165736c5de94b4d4ad62540704dda318b4f4ec9955ea7eb51427f5845073c2866f5481fd3b9c56c7c131c0a2837217e55b6713e9a6922d0385ea3cd808

    • SSDEEP

      3072:UYYyPmaMC1DWXWjvvvvvbky7y7y7yMyuyJyVycykyFyPy0y8yDycyRyRyG+m+6+7:mGMb6h1X

    Score
    10/10
    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks