General
-
Target
Копія вихідної позовної ухвали.vbs
-
Size
14KB
-
Sample
240902-pergpazdkj
-
MD5
3df171ee8218dc8e8baffe34182d431f
-
SHA1
94495da87627355cdbfd2ab36a1d7beced35ec9c
-
SHA256
5640cb7c1399cf63031ade147e623ad9f9d63fb350addc550eae4141c2fe4431
-
SHA512
cf7e80192f3f6379f13ee867b7248fb7153f2a6be0c6f187876b9a21430f9f2cf82863eeaf50ef35c95742c45a09eeb19d79d4d558fab076c8a6d64f2ffcf319
-
SSDEEP
192:vNjEQQX0KGFqxncbke3u9judG27J7FN2IEu/CRRkvO3MZGsugdcGPJZMxu2hlYFH:vNOGtw79jObvFQMIsu0PJmxNSiMFpW8x
Static task
static1
Behavioral task
behavioral1
Sample
Копія вихідної позовної ухвали.vbs
Resource
win11-20240802-en
Malware Config
Extracted
xenorat
111.90.147.147
fjsjhgf
-
delay
5000
-
install_path
nothingset
-
port
5652
-
startup_name
nothingset
Targets
-
-
Target
Копія вихідної позовної ухвали.vbs
-
Size
14KB
-
MD5
3df171ee8218dc8e8baffe34182d431f
-
SHA1
94495da87627355cdbfd2ab36a1d7beced35ec9c
-
SHA256
5640cb7c1399cf63031ade147e623ad9f9d63fb350addc550eae4141c2fe4431
-
SHA512
cf7e80192f3f6379f13ee867b7248fb7153f2a6be0c6f187876b9a21430f9f2cf82863eeaf50ef35c95742c45a09eeb19d79d4d558fab076c8a6d64f2ffcf319
-
SSDEEP
192:vNjEQQX0KGFqxncbke3u9judG27J7FN2IEu/CRRkvO3MZGsugdcGPJZMxu2hlYFH:vNOGtw79jObvFQMIsu0PJmxNSiMFpW8x
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1