MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 26c09b99ccf20a046c2dc963395465b7bf5c4b58de0d859a2a00521c4c8b489d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 6
| SHA256 hash: | 26c09b99ccf20a046c2dc963395465b7bf5c4b58de0d859a2a00521c4c8b489d |
|---|---|
| SHA3-384 hash: | 61eba9e8ccc1177637cbdd41f562a6d570af173471d2deb500b27df7d8542802cc75d594d526ff8991932ac08ae81237 |
| SHA1 hash: | a7e3a62d4f67df871e5d7efb86091423317fd6f3 |
| MD5 hash: | 75d8998bce4042d50caec8af23774de8 |
| humanhash: | steak-glucose-eighteen-lamp |
| File name: | wejustgivenbestpeopelswithbetterthaneverbeforetogetback.vbe |
| Download: | download sample |
| File size: | 2'747'228 bytes |
| First seen: | 2025-06-27 11:58:04 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/octet-stream |
| ssdeep | 24576:G+iSJqI+323XH6xr689ZvOYMikNfWqsNRPI0PaFYhQv+wIQaTB26INulFSomVk94:L6NrnMhyg |
| TLSH | T11BD59F5C94B09CA16468FF34AA89F7C78CE903952B2B0B520FE595923352C43FEA3775 |
| TrID | 66.6% (.TXT) Text - UTF-16 (LE) encoded (2000/1) 33.3% (.MP3) MP3 audio (1000/1) |
| Magika | mp3 |
| Reporter | |
| Tags: | links-dansarindustries-com vbe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
64
Origin country :
ITVendor Threat Intelligence
Detection(s):
Verdict:
Malicious
Score:
90.2%
Tags:
obfuscate xtreme shell
Verdict:
Unknown
Threat level:
2.5/10
Confidence:
100%
Verdict:
Suspicious
Labled as:
VBS/Agent.CCJ
Gathering data
Threat name:
Script-WScript.Trojan.Generic
Status:
Suspicious
First seen:
2025-06-27 01:11:59 UTC
File Type:
Binary
AV detection:
6 of 24 (25.00%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
8/10
Tags:
discovery execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
vbe 26c09b99ccf20a046c2dc963395465b7bf5c4b58de0d859a2a00521c4c8b489d
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.