MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 75b6589abb41cfee6bd7a5bf66237e679d7f7a2039bb244d02c9faf1d68fb39f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 75b6589abb41cfee6bd7a5bf66237e679d7f7a2039bb244d02c9faf1d68fb39f
SHA3-384 hash: 458013bc05773213167db26ba9dad8512b42e62fc5ac243e964c2e33037993fbaf7eb8fdc277e194bb48f290c5f030e5
SHA1 hash: 9ceb2953fdc54732f8fd1c3247b395f7597aed13
MD5 hash: c8158b8b24173de5abd0008e90d07d45
humanhash: ten-wyoming-georgia-quebec
File name:Remittance-current-order.vbs
Download: download sample
File size:20'840 bytes
First seen:2022-11-10 07:25:47 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 384:VzRYNZ/6uKClbo5huozUSQNFr4cMxfOwQS41VqWnCc0ov0ZEiy1UfZc/uP0:rY//6bGWOSQNu3R41VqWnCI1YquP0
Threatray 3'118 similar samples on MalwareBazaar
TLSH T1B392E3984FAB119D116352FBAA4E1139E914C4FB445088B6BC2EF8758E443613EFD88F
Reporter abuse_ch
Tags:vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
101
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
evasive
Result
Verdict:
UNKNOWN
Details
Base64 Encoded URL
Detected an ANSI or UNICODE http:// or https:// base64 encoded URL prefix.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
expl.evad
Score:
84 / 100
Signature
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Obfuscated command line found
Potential malicious VBS script found (suspicious strings)
Sigma detected: Dot net compiler compiles file from suspicious location
VBScript performs obfuscated calls to suspicious functions
Very long command line found
Wscript starts Powershell (via cmd or directly)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 742809 Sample: Remittance-current-order.vbs Startdate: 10/11/2022 Architecture: WINDOWS Score: 84 36 Malicious sample detected (through community Yara rule) 2->36 38 Sigma detected: Dot net compiler compiles file from suspicious location 2->38 40 Potential malicious VBS script found (suspicious strings) 2->40 42 Machine Learning detection for dropped file 2->42 8 wscript.exe 1 2->8         started        process3 signatures4 44 VBScript performs obfuscated calls to suspicious functions 8->44 46 Wscript starts Powershell (via cmd or directly) 8->46 48 Obfuscated command line found 8->48 50 Very long command line found 8->50 11 powershell.exe 15 26 8->11         started        15 cmd.exe 1 8->15         started        process5 dnsIp6 34 drive.google.com 142.250.203.110, 443, 49717 GOOGLEUS United States 11->34 32 C:\Users\user\AppData\...\zqgnrvk0.cmdline, Unicode 11->32 dropped 17 csc.exe 3 11->17         started        20 WerFault.exe 23 9 11->20         started        22 conhost.exe 11->22         started        24 WerFault.exe 11->24         started        26 conhost.exe 15->26         started        file7 process8 file9 30 C:\Users\user\AppData\Local\...\zqgnrvk0.dll, PE32 17->30 dropped 28 cvtres.exe 1 17->28         started        process10
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Blocklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Visual Basic Script (vbs) vbs 75b6589abb41cfee6bd7a5bf66237e679d7f7a2039bb244d02c9faf1d68fb39f

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments