General
-
Target
urus.vbs
-
Size
7KB
-
Sample
241115-w5bbqasrbp
-
MD5
25de5fe745e57db4651b5f94e304bdfa
-
SHA1
4d9fa4d21d15cc0c03d854231bd70d282372bf8f
-
SHA256
407e0c29afa9d348ae940f3af63265c1625c48e9a721db9e8ebf152896747188
-
SHA512
dd493fbb8ad07334c5f7c2b747a7bceedb57ecdf09fbddb9be1f3aab507647df1ee4a5fad5b8092ba62cb20ec6545336eda0a80eff0e6f1cc9eefe8d71a56406
-
SSDEEP
96:0aEGrT5eQzzLjhYiHsE6lH1CHeWO8gjRNtjOY8GmT:fE2TV/5YiRgHaeN8gjv7mT
Static task
static1
Behavioral task
behavioral1
Sample
urus.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
urus.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_http
http://89.197.154.116:7810/INxqeV8X2ONsfm1_CojSGwEEM-uE3ldkjmKzAbS4SGewjwSXxNxPVpqjwbZdrPAArvIZkTRvbOjtehX19ggnBeY1pNXSPhdbMzp3rdTENnhsi52l_V9ANGsqF3TrNhOCkNDFy-_D_MRDdn8yVErWpL0WUtCGus_SL4JNOJ0f6
Targets
-
-
Target
urus.vbs
-
Size
7KB
-
MD5
25de5fe745e57db4651b5f94e304bdfa
-
SHA1
4d9fa4d21d15cc0c03d854231bd70d282372bf8f
-
SHA256
407e0c29afa9d348ae940f3af63265c1625c48e9a721db9e8ebf152896747188
-
SHA512
dd493fbb8ad07334c5f7c2b747a7bceedb57ecdf09fbddb9be1f3aab507647df1ee4a5fad5b8092ba62cb20ec6545336eda0a80eff0e6f1cc9eefe8d71a56406
-
SSDEEP
96:0aEGrT5eQzzLjhYiHsE6lH1CHeWO8gjRNtjOY8GmT:fE2TV/5YiRgHaeN8gjv7mT
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-