General
-
Target
c34b1264320651723222ea0785511f7f317dd295b38b0c0a23d0ac421a3c1e48.vbs
-
Size
187KB
-
Sample
240627-b1g89aydmp
-
MD5
4948f25f03e8b1e397066530f79d85dd
-
SHA1
3d8328d506504a47eefaa9425b08a4070ef494e5
-
SHA256
c34b1264320651723222ea0785511f7f317dd295b38b0c0a23d0ac421a3c1e48
-
SHA512
d92a357cfdfc0810fc31cd4ad3f35ec62f4860338d626ab4b79e027431fe70556ecc330650b4848803a84077b5fd9b93fd58380bbc2adda8953b2322ea5c06d1
-
SSDEEP
3072:YmN8GGebKjeK3ubth+DCFxKCvBB/WnHPP1w/sLJFJ281QIHz1y8mNy7Ey1MgKTZ/:Y08GxbKja3+DCbKCvBB/WnHXC/sLJFJw
Static task
static1
Behavioral task
behavioral1
Sample
c34b1264320651723222ea0785511f7f317dd295b38b0c0a23d0ac421a3c1e48.vbs
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
c34b1264320651723222ea0785511f7f317dd295b38b0c0a23d0ac421a3c1e48.vbs
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
c34b1264320651723222ea0785511f7f317dd295b38b0c0a23d0ac421a3c1e48.vbs
-
Size
187KB
-
MD5
4948f25f03e8b1e397066530f79d85dd
-
SHA1
3d8328d506504a47eefaa9425b08a4070ef494e5
-
SHA256
c34b1264320651723222ea0785511f7f317dd295b38b0c0a23d0ac421a3c1e48
-
SHA512
d92a357cfdfc0810fc31cd4ad3f35ec62f4860338d626ab4b79e027431fe70556ecc330650b4848803a84077b5fd9b93fd58380bbc2adda8953b2322ea5c06d1
-
SSDEEP
3072:YmN8GGebKjeK3ubth+DCFxKCvBB/WnHPP1w/sLJFJ281QIHz1y8mNy7Ey1MgKTZ/:Y08GxbKja3+DCbKCvBB/WnHXC/sLJFJw
Score10/10-
Detects executables built or packed with MPress PE compressor
-
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-