MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7682422fbf1ea8822eb5361adb5ed7b4c9580781ad88502278b4bc2f9b591397. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 7682422fbf1ea8822eb5361adb5ed7b4c9580781ad88502278b4bc2f9b591397
SHA3-384 hash: 62d3c1baf66e5de85477ee63f94f6b8447f2aec2bef78dfb1e4dc411bd2988f92654329de5d3aaafc9654b8d7839e0c2
SHA1 hash: 72c3a8a7bfa6c771d35fb81d7a2b7d21e31053f9
MD5 hash: a1ba88134955b82354528e114578f62f
humanhash: batman-fruit-equal-bluebird
File name:xx.vbs
Download: download sample
File size:2'374 bytes
First seen:2022-08-15 09:17:07 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 48:pP8sWTy7OBOwVTxttcBEEpLFtUcVJoyo8P5ZZ:pVWJOw3tGlpLUc95ZZ
Threatray 2'241 similar samples on MalwareBazaar
TLSH T18D41AFC95C44E76E9FCC221EE097F8875660BB27D6A64E144BCB0ACA35F504CB189CB7
Reporter ankit_anubhav
Tags:vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
189
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
76 / 100
Signature
Antivirus detection for URL or domain
Command shell drops VBS files
Obfuscated command line found
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
System process connects to network (likely due to code injection or exploit)
VBScript performs obfuscated calls to suspicious functions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 683915 Sample: xx.vbs Startdate: 15/08/2022 Architecture: WINDOWS Score: 76 36 Antivirus detection for URL or domain 2->36 9 wscript.exe 2->9         started        process3 signatures4 38 System process connects to network (likely due to code injection or exploit) 9->38 40 VBScript performs obfuscated calls to suspicious functions 9->40 42 Obfuscated command line found 9->42 44 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 9->44 12 cmd.exe 1 9->12         started        process5 process6 14 cmd.exe 1 12->14         started        16 cmd.exe 2 12->16         started        20 conhost.exe 12->20         started        file7 22 cmd.exe 3 2 14->22         started        30 C:\Users\Public\KefYf3ngx57.vbs, ASCII 16->30 dropped 34 Command shell drops VBS files 16->34 signatures8 process9 process10 24 wscript.exe 14 22->24         started        28 conhost.exe 22->28         started        dnsIp11 32 8fu11.hopto.org 206.81.8.116, 443, 49739, 49741 DIGITALOCEAN-ASNUS United States 24->32 46 System process connects to network (likely due to code injection or exploit) 24->46 signatures12
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Blocklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments