General
-
Target
498b038f610b49e31b24ac641a1010d4
-
Size
733B
-
Sample
240107-vfrrqsahcp
-
MD5
498b038f610b49e31b24ac641a1010d4
-
SHA1
d44a1e96a3ab5747705dbb242ab07e452e1ae9bb
-
SHA256
d424a08c1e1eac484c029a6ef4008bf991aebf26a86aa02fecd18ad60bb24a0f
-
SHA512
355352707e9638b3b3226c867d89d6dbacd6a8886a7f2ea3ccd280aedae78e3cbc86f0d3a89ef2c754959d4322fc635476c4358d8cf9b8175c42a659ba0d45c6
Static task
static1
Behavioral task
behavioral1
Sample
498b038f610b49e31b24ac641a1010d4.vbs
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
498b038f610b49e31b24ac641a1010d4.vbs
Resource
win10v2004-20231215-en
Malware Config
Extracted
http://transfer.sh/get/1jmaVDV/model.txt
Targets
-
-
Target
498b038f610b49e31b24ac641a1010d4
-
Size
733B
-
MD5
498b038f610b49e31b24ac641a1010d4
-
SHA1
d44a1e96a3ab5747705dbb242ab07e452e1ae9bb
-
SHA256
d424a08c1e1eac484c029a6ef4008bf991aebf26a86aa02fecd18ad60bb24a0f
-
SHA512
355352707e9638b3b3226c867d89d6dbacd6a8886a7f2ea3ccd280aedae78e3cbc86f0d3a89ef2c754959d4322fc635476c4358d8cf9b8175c42a659ba0d45c6
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-