General
-
Target
vb.vbs
-
Size
1KB
-
Sample
241003-rey8msyglr
-
MD5
4f06b12e890e19ecc7d71fb0353e209c
-
SHA1
5064eeaef0e706cbac734bd014993805a96e70db
-
SHA256
318550907c41746ca0a815c0b8856e42cda84a2db6700311a89766d5aa136c9f
-
SHA512
7a40b05e1c30ef6617a73b7679f5caaa023e717b70fd3821b0468dc06e5a29a0dffff73167842c897c35d86fc9153c5628fb692d4de8d6668f95ad88c7d0ba66
Static task
static1
Behavioral task
behavioral1
Sample
vb.vbs
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
vb.vbs
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://pastebin.com/raw/UxiyyjiX
https://pastebin.com/raw/UxiyyjiX
Extracted
https://pastebin.com/raw/uRxFsn59
https://pastebin.com/raw/20fZZM5U
Targets
-
-
Target
vb.vbs
-
Size
1KB
-
MD5
4f06b12e890e19ecc7d71fb0353e209c
-
SHA1
5064eeaef0e706cbac734bd014993805a96e70db
-
SHA256
318550907c41746ca0a815c0b8856e42cda84a2db6700311a89766d5aa136c9f
-
SHA512
7a40b05e1c30ef6617a73b7679f5caaa023e717b70fd3821b0468dc06e5a29a0dffff73167842c897c35d86fc9153c5628fb692d4de8d6668f95ad88c7d0ba66
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-