MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3837824d517d96ca782894c985bc891bdd3d2202a49f65f5fdef9cdffbfce783. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 3837824d517d96ca782894c985bc891bdd3d2202a49f65f5fdef9cdffbfce783
SHA3-384 hash: 237d4fd1ba12a5309efc0b6a85d7b1d46c7b053ecc1336ae43fae2a00bbfe21485df5f177a29e44c36ab91ceedd16d37
SHA1 hash: 3b689b8c663fbec2efe948067d0a5533c1f905e1
MD5 hash: f075d2956f9a3d4b764038b37607de67
humanhash: pizza-oranges-johnny-delta
File name:iboka6.hta
Download: download sample
File size:1'040 bytes
First seen:2024-12-10 08:46:12 UTC
Last seen:Never
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 24:I07YKzACBrZWKepiHVQtNki+MGYUpMK/QzMldXOMC2:IkYsBNYpiH6fkidHKYzMlFRC2
TLSH T16B1175B3FC27B497A7537DF1ED77670AB8B090044236289436A8D41214A8C5B83870C5
Magika vba
Reporter abuse_ch
Tags:hta

Intelligence


File Origin
# of uploads :
1
# of downloads :
74
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
94.9%
Tags:
obfuscate xtreme shell
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Payload URLs
URL
File name
https://raw.githubusercontent.com/farao151e/s/main/jod.jpg
HTA File
Behaviour
BlacklistAPI detected
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm
Result
Verdict:
MALICIOUS
Details
Malicious Scriptlet 3 of 7
Detected a malicious pivot typically seen during the 'file-less' pivot commonly seen in malware carriers.
Hidden Powershell
Detected a pivot to Powershell that utilizes commonly nefarious attributes such as '-windowstyle hidden'.
Result
Threat name:
n/a
Detection:
malicious
Classification:
expl.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Command shell drops VBS files
Creates processes via WMI
Loading BitLocker PowerShell Module
Multi AV Scanner detection for submitted file
Obfuscated command line found
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes or reads registry keys via WMI
Writes registry values via WMI
Wscript starts Powershell (via cmd or directly)
Yara detected Powershell download and execute
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1572231 Sample: iboka6.hta Startdate: 10/12/2024 Architecture: WINDOWS Score: 100 56 raw.githubusercontent.com 2->56 58 h.top4top.io 2->58 66 Multi AV Scanner detection for submitted file 2->66 68 Yara detected Powershell download and execute 2->68 70 Suspicious powershell command line found 2->70 72 5 other signatures 2->72 9 powershell.exe 17 51 2->9         started        14 wscript.exe 1 2->14         started        16 wscript.exe 2->16         started        18 mshta.exe 2->18         started        signatures3 process4 dnsIp5 62 raw.githubusercontent.com 185.199.109.133, 443, 49720 FASTLYUS Netherlands 9->62 54 C:\Users\user\AppData\Roaming\lapis.vbs, ASCII 9->54 dropped 82 Loading BitLocker PowerShell Module 9->82 20 wscript.exe 1 9->20         started        23 conhost.exe 9->23         started        84 Wscript starts Powershell (via cmd or directly) 14->84 25 powershell.exe 14->25         started        27 cmd.exe 14->27         started        29 powershell.exe 16->29         started        31 cmd.exe 16->31         started        86 Creates processes via WMI 18->86 file6 signatures7 process8 signatures9 74 Wscript starts Powershell (via cmd or directly) 20->74 76 Windows Scripting host queries suspicious COM object (likely to drop second stage) 20->76 78 Suspicious execution chain found 20->78 80 2 other signatures 20->80 33 cmd.exe 2 20->33         started        37 powershell.exe 25 20->37         started        40 conhost.exe 25->40         started        42 conhost.exe 27->42         started        44 conhost.exe 29->44         started        46 conhost.exe 31->46         started        process10 dnsIp11 52 C:\Users\user\AppData\Local\lapis.vbs, ASCII 33->52 dropped 64 Command shell drops VBS files 33->64 48 conhost.exe 33->48         started        60 h.top4top.io 135.181.63.70, 443, 49733, 49769 HETZNER-ASDE Germany 37->60 50 conhost.exe 37->50         started        file12 signatures13 process14
Threat name:
Win32.Trojan.Valyria
Status:
Malicious
First seen:
2021-02-01 22:55:54 UTC
File Type:
Text (VBS)
AV detection:
8 of 38 (21.05%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery execution
Behaviour
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Process spawned unexpected child process
Malware Config
Dropper Extraction:
https://raw.githubusercontent.com/farao151e/s/main/jod.jpg
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

HTML Application (hta) hta 3837824d517d96ca782894c985bc891bdd3d2202a49f65f5fdef9cdffbfce783

(this sample)

  
Delivery method
Distributed via web download

Comments