MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3d7d08118935757fe3f528538abde2e16f054264127b6f420c2ee44e6fcff568. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 3d7d08118935757fe3f528538abde2e16f054264127b6f420c2ee44e6fcff568
SHA3-384 hash: 1e0946b2a1a7a14bee3367e26fd5f0251382e2fdf0ebeeaf64c0477824e933657d6957819eb851af8b5eb934b47c20bf
SHA1 hash: 8dd178013729f2e8387f56ab3fede0763052fbe9
MD5 hash: 14022f99d9301ca99037324ed0a370ea
humanhash: violet-happy-arizona-quebec
File name:Aosmic.vbs
Download: download sample
File size:16'626 bytes
First seen:2022-11-14 13:05:55 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 384:Ur2bBhccdR5ccJccZccScYccpcclccCccrccbccvcc6ccJccccc+ycc+cmccJccz:tY7s59bEfZJW02r+U4j
Threatray 3'177 similar samples on MalwareBazaar
TLSH T122725B90DF81361BC68E1ACC6C039C4A816F7660B53558F47DA09347EE05D8ED0FA26E
Reporter abuse_ch
Tags:vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
122
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
evasive
Result
Verdict:
MALICIOUS
Result
Threat name:
Unknown
Detection:
malicious
Classification:
expl.evad
Score:
84 / 100
Signature
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Obfuscated command line found
Potential malicious VBS script found (suspicious strings)
Sigma detected: Dot net compiler compiles file from suspicious location
VBScript performs obfuscated calls to suspicious functions
Very long command line found
Wscript starts Powershell (via cmd or directly)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 745570 Sample: Aosmic.vbs Startdate: 14/11/2022 Architecture: WINDOWS Score: 84 34 Malicious sample detected (through community Yara rule) 2->34 36 Sigma detected: Dot net compiler compiles file from suspicious location 2->36 38 Potential malicious VBS script found (suspicious strings) 2->38 40 Machine Learning detection for dropped file 2->40 8 wscript.exe 1 1 2->8         started        process3 signatures4 42 VBScript performs obfuscated calls to suspicious functions 8->42 44 Wscript starts Powershell (via cmd or directly) 8->44 46 Obfuscated command line found 8->46 48 Very long command line found 8->48 11 powershell.exe 15 26 8->11         started        15 cmd.exe 1 8->15         started        process5 dnsIp6 32 drive.google.com 172.217.168.46, 443, 49715 GOOGLEUS United States 11->32 30 C:\Users\user\AppData\...\a1k3fmh0.cmdline, Unicode 11->30 dropped 17 csc.exe 3 11->17         started        20 WerFault.exe 23 9 11->20         started        22 conhost.exe 11->22         started        24 conhost.exe 15->24         started        file7 process8 file9 28 C:\Users\user\AppData\Local\...\a1k3fmh0.dll, PE32 17->28 dropped 26 cvtres.exe 1 17->26         started        process10
Threat name:
Win32.Trojan.Valyria
Status:
Malicious
First seen:
2022-11-14 12:57:58 UTC
File Type:
Text (VBS)
AV detection:
5 of 40 (12.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Blocklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments