General
-
Target
invoicee.vbs
-
Size
5KB
-
Sample
240328-h1jkmsch68
-
MD5
4f3c2595c01b4be843632c216c87822d
-
SHA1
2addad8442190523cc1150c6d6b8e367734d856a
-
SHA256
5855a6fcd1d191064c75015b7244802bdedc569dcd9d7b815f6d6038e2f49ca6
-
SHA512
168ed6086e94e6c7bce696b3d2a36ccd1ae1fd88e1101bdfbaa67fe853715ca40c65ef4e9fe1851c9bc69a409c088d4cb739fa28fff5340cdfbacbf532dc1a5b
-
SSDEEP
96:eqZTm5uYMViSnctPXo2p4QXnwD0mSGQCPz8fFGZ2krTGQEETGtC7:ZmHos4QXnP9uga2krTHTN
Static task
static1
Behavioral task
behavioral1
Sample
invoicee.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
invoicee.vbs
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
invoicee.vbs
-
Size
5KB
-
MD5
4f3c2595c01b4be843632c216c87822d
-
SHA1
2addad8442190523cc1150c6d6b8e367734d856a
-
SHA256
5855a6fcd1d191064c75015b7244802bdedc569dcd9d7b815f6d6038e2f49ca6
-
SHA512
168ed6086e94e6c7bce696b3d2a36ccd1ae1fd88e1101bdfbaa67fe853715ca40c65ef4e9fe1851c9bc69a409c088d4cb739fa28fff5340cdfbacbf532dc1a5b
-
SSDEEP
96:eqZTm5uYMViSnctPXo2p4QXnwD0mSGQCPz8fFGZ2krTGQEETGtC7:ZmHos4QXnP9uga2krTHTN
Score8/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-