General
-
Target
44831d3a442b0c6a9e5de879e3e99621
-
Size
3KB
-
Sample
240105-1lfjjscdc9
-
MD5
44831d3a442b0c6a9e5de879e3e99621
-
SHA1
3950817943f762666a4aed29bd07945e76002c6f
-
SHA256
8aeb965677a1c620341bb314a7c4c59d2692f572fb1f79de81fceee647d2c0bd
-
SHA512
0038e2b13be81be35b7b8ee335e61def4d56c7197e804f85d81a1418fbc80a8d5543f484856e40832d2feab6344625c1b4832686b3bd31b67e2c8c486a12200f
Static task
static1
Behavioral task
behavioral1
Sample
Pending_invoice#YT.vbs
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Pending_invoice#YT.vbs
Resource
win10v2004-20231222-en
Malware Config
Extracted
https://transfer.sh/1fxtG6x/bypassbook.txt
Targets
-
-
Target
Pending_invoice#YT.vbs
-
Size
1KB
-
MD5
8414a4e55d98be8c6db2a6402dc5dcf7
-
SHA1
e7b0029f57d414c59fac378cd8d96277195b0bc3
-
SHA256
766d8e9d2d0de0a0ba2440a847e7eb7da3e69d51331e15a61ec1d25d3d92fc3e
-
SHA512
5a5f4cc80581b2d6c0bc6b20e24bc12b224e6c995cb5b701fdbf0a0aa3430fa22a955d43f7c6fe6707ef3ea91b87fbaabd4e816b4953aa18db29a554ec2c863d
Score10/10 -