MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 769940e161bd543f278dba9c0b5c58edefe07f47dde1bc54c093b752168c45e7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 769940e161bd543f278dba9c0b5c58edefe07f47dde1bc54c093b752168c45e7
SHA3-384 hash: 5f2a4fc32f0727290f6c9c9774452c56614624767219e55172f08c6c6920598709960b7d5aff23ac7650cba536961963
SHA1 hash: d3a435c8d5922345da73fece405faff8eb6db4e7
MD5 hash: 22798ade0df21851037277fb3789ea08
humanhash: wolfram-jupiter-twenty-missouri
File name:769940e161bd543f278dba9c0b5c58edefe07f47dde1bc54c093b752168c45e7.vbs
Download: download sample
File size:70'776 bytes
First seen:2025-08-07 11:39:49 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 192:iu5wiaJTZYOSMgqUIEIs1bSLwx4pHg1ZG2lpGMRARchQafeqQBbXT5C5oKpN6Xew:QL9Zf57JXpUqUy5msh
Threatray 207 similar samples on MalwareBazaar
TLSH T19B63B24DBE1E2CC73A91EF28610C01709F7D8611B8996D597A9E3B5A83FEF0C2897D50
Magika vba
Reporter JAMESWT_WT
Tags:198-55-102-200 vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
27
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
94.9%
Tags:
obfuscate xtreme spawn
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
threat
Verdict:
Malware
YARA:
3 match(es)
Tags:
Batch Command DeObfuscated Html PowerShell PowerShell Call VBScript WScript.Shell
Threat name:
Script-WScript.Downloader.RemcosRAT
Status:
Malicious
First seen:
2025-07-31 15:35:29 UTC
AV detection:
6 of 24 (25.00%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Malware Config
Dropper Extraction:
http://216.9.224.88/xampp/cv/optimized_MSI.png
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments