MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d48e5ec3a407e3bbc0e9d9d365853a5f49fec7240c2a07d1fad88859ff753be5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: d48e5ec3a407e3bbc0e9d9d365853a5f49fec7240c2a07d1fad88859ff753be5
SHA3-384 hash: 6b6b1fd3ce063fb284041872a227ce1830e70ec7b35e923547e9e816993830a0d463fbf1ea18a3a5c3ad20ef290fca6a
SHA1 hash: 741159ce52e9f8c6ddb460e17e54a3b2acb9361b
MD5 hash: f4be96c6b16e2874efecc4165ec908a0
humanhash: eighteen-oranges-one-oregon
File name:wennedrightpersontoanswerforbestfeautrestogivenmebest.vbs
Download: download sample
File size:72'292 bytes
First seen:2025-08-07 12:01:21 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 384:sWiKYva+7hwPxakcDi/gMy10pE9F9cdX9wQxQ0bEe9rhOuE+QUxGVqLQ8VeCwwvh:zM54xXYc03oXpHF
TLSH T1EF63B1D1CB5A2CE09A95233F737B07D9CAD84EC89D8A2C7A79CBC64AB35231570C7851
Magika vba
Reporter JAMESWT_WT
Tags:107-172-238-5 MSI-STEGO vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
27
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
94.9%
Tags:
obfuscate xtreme spawn
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 obfuscated overlay powershell threat
Gathering data
Threat name:
Script-WScript.Downloader.RemcosRAT
Status:
Malicious
First seen:
2025-08-05 12:47:57 UTC
File Type:
Text (HTML)
Extracted files:
2
AV detection:
11 of 37 (29.73%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
collection discovery execution
Behaviour
Checks processor information in registry
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Checks computer location settings
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Malware Config
Dropper Extraction:
https://archive.org/download/msi_20250801/MSI.png
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments