MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4afae0ed98ed2637f47f0fa45d2739baf2fe59ca3448bcb85076f7a36e0e2806. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 4afae0ed98ed2637f47f0fa45d2739baf2fe59ca3448bcb85076f7a36e0e2806
SHA3-384 hash: 36dcc50a6107680aeb3ce97326fcc8104e9d18fe0ab64c27bb3a59aab1f22a048fe529aef6d823c11c8493e4195a4c12
SHA1 hash: ec95175808bf48bddfba44785c24988543e35d6c
MD5 hash: fd51594ebe1ca6ec0134b9199fc4149f
humanhash: tango-tango-uniform-eighteen
File name:fd51594ebe1ca6ec0134b9199fc4149f.vbs
Download: download sample
File size:403'305 bytes
First seen:2025-06-30 18:55:43 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 768:HPHA2fjiXfNNKfjRgfjr2fjNKfjggf8ifjgf2NfgjfNjrfjK2frXfr8fj2jfjRRo:qT
TLSH T1B484A93CDA78E91B2EF0EB06CC4271B49BF5563B89E26B1E0D5F150E81845EB5E6B1C0
Magika vba
Reporter abuse_ch
Tags:BRA Geofenced vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
140
Origin country :
SE SE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
92.5%
Tags:
shell overt sage
Result
Threat name:
n/a
Detection:
malicious
Classification:
expl.evad
Score:
92 / 100
Signature
Bypasses PowerShell execution policy
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for submitted file
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
VBScript performs obfuscated calls to suspicious functions
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1725857 Sample: fTg4pjY7xf.vbs Startdate: 30/06/2025 Architecture: WINDOWS Score: 92 25 Multi AV Scanner detection for submitted file 2->25 27 Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation 2->27 29 Sigma detected: WScript or CScript Dropper 2->29 31 2 other signatures 2->31 8 wscript.exe 1 2->8         started        process3 signatures4 33 VBScript performs obfuscated calls to suspicious functions 8->33 35 Suspicious powershell command line found 8->35 37 Wscript starts Powershell (via cmd or directly) 8->37 39 3 other signatures 8->39 11 powershell.exe 4 14 8->11         started        process5 signatures6 41 Suspicious execution chain found 11->41 14 curl.exe 2 11->14         started        17 conhost.exe 11->17         started        19 msiexec.exe 11->19         started        process7 dnsIp8 23 127.0.0.1 unknown unknown 14->23 21 conhost.exe 14->21         started        process9
Verdict:
inconclusive
YARA:
1 match(es)
Tags:
DeObfuscated Obfuscated T1059.005 VBScript
Threat name:
Win32.Trojan.Boxter
Status:
Malicious
First seen:
2025-06-30 18:56:10 UTC
File Type:
Text (VBS)
AV detection:
5 of 24 (20.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
execution
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Malware Config
Dropper Extraction:
https://storage.googleapis.com/bucket-uyntvntrsdf280u4/aleatoria/3r30akht5222jyg1/installer.msi
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments