General
-
Target
3e5033d36f886c3aa8fa319381307dcb9aeeafda49a3d0dd6334f5433f35ea28.vbs
-
Size
1.1MB
-
Sample
240604-bn3pesgb3s
-
MD5
67f4de0d4b0f309660d46318c6b83a11
-
SHA1
fa931f9e93b0defb42ad0c3046d7356dc1e9c6bd
-
SHA256
3e5033d36f886c3aa8fa319381307dcb9aeeafda49a3d0dd6334f5433f35ea28
-
SHA512
f7373111edbd586ddd67c5fb7e08942a88a1488e991fb0b0c89594f71c37ea5ec2379c0a626f4adb4e69df091cf11f72890b1835638daff6832869b90ddd9169
-
SSDEEP
12288:p31cvBzbU01qal638iNX3iTMgmuYtWN/ZgMiQPeRjoU4:pYz64+2Sjo5
Static task
static1
Behavioral task
behavioral1
Sample
3e5033d36f886c3aa8fa319381307dcb9aeeafda49a3d0dd6334f5433f35ea28.vbs
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3e5033d36f886c3aa8fa319381307dcb9aeeafda49a3d0dd6334f5433f35ea28.vbs
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
3e5033d36f886c3aa8fa319381307dcb9aeeafda49a3d0dd6334f5433f35ea28.vbs
-
Size
1.1MB
-
MD5
67f4de0d4b0f309660d46318c6b83a11
-
SHA1
fa931f9e93b0defb42ad0c3046d7356dc1e9c6bd
-
SHA256
3e5033d36f886c3aa8fa319381307dcb9aeeafda49a3d0dd6334f5433f35ea28
-
SHA512
f7373111edbd586ddd67c5fb7e08942a88a1488e991fb0b0c89594f71c37ea5ec2379c0a626f4adb4e69df091cf11f72890b1835638daff6832869b90ddd9169
-
SSDEEP
12288:p31cvBzbU01qal638iNX3iTMgmuYtWN/ZgMiQPeRjoU4:pYz64+2Sjo5
Score8/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-