General
-
Target
https://www.dropbox.com/scl/fi/tt3yy1q3q7c4jvz6bugsa/ReservaID.vbs?rlkey=53ws2ttg48g4aiby8fdxch9bw&st=uqfcvqbs&dl=1
-
Sample
240930-yer8nasbmq
Score
8/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.dropbox.com/scl/fi/tt3yy1q3q7c4jvz6bugsa/ReservaID.vbs?rlkey=53ws2ttg48g4aiby8fdxch9bw&st=uqfcvqbs&dl=1
Resource
win10v2004-20240802-en
13 signatures
150 seconds
Malware Config
Targets
-
-
Target
https://www.dropbox.com/scl/fi/tt3yy1q3q7c4jvz6bugsa/ReservaID.vbs?rlkey=53ws2ttg48g4aiby8fdxch9bw&st=uqfcvqbs&dl=1
Score8/10-
Blocklisted process makes network request
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-