General
-
Target
13d2d3d9d17bd6ad8f75ba47c24f65f41641a59c353825a577075b34740adf8d.vbs
-
Size
32KB
-
Sample
240918-ha293axeqr
-
MD5
f86db186324ba1041c28ec03385013eb
-
SHA1
55334ef1aaca04dcca4bd5fde434272440b882cf
-
SHA256
13d2d3d9d17bd6ad8f75ba47c24f65f41641a59c353825a577075b34740adf8d
-
SHA512
bbe161665741d7a0a1c0575321385e5557a1fcfd8155c40a28c53d9c4734ba76e73d6b5bcc0efea1916d16b69aa4b59d697117639f8053460bddbf5fb3d127a0
-
SSDEEP
384:Z9vOg3ezwXxR+gMJjRK7A4a88pk/Biyc2mmev5Nil3uCHgp:Zp3eGR+gMJdAPMRyG1i4Jp
Static task
static1
Behavioral task
behavioral1
Sample
13d2d3d9d17bd6ad8f75ba47c24f65f41641a59c353825a577075b34740adf8d.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
13d2d3d9d17bd6ad8f75ba47c24f65f41641a59c353825a577075b34740adf8d.vbs
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
13d2d3d9d17bd6ad8f75ba47c24f65f41641a59c353825a577075b34740adf8d.vbs
-
Size
32KB
-
MD5
f86db186324ba1041c28ec03385013eb
-
SHA1
55334ef1aaca04dcca4bd5fde434272440b882cf
-
SHA256
13d2d3d9d17bd6ad8f75ba47c24f65f41641a59c353825a577075b34740adf8d
-
SHA512
bbe161665741d7a0a1c0575321385e5557a1fcfd8155c40a28c53d9c4734ba76e73d6b5bcc0efea1916d16b69aa4b59d697117639f8053460bddbf5fb3d127a0
-
SSDEEP
384:Z9vOg3ezwXxR+gMJjRK7A4a88pk/Biyc2mmev5Nil3uCHgp:Zp3eGR+gMJdAPMRyG1i4Jp
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-