MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7b75cfc8d8f78028f5cdc2f03e4aa7be1ad15e567d227d353c6cbc2e378271ff. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments 1

SHA256 hash: 7b75cfc8d8f78028f5cdc2f03e4aa7be1ad15e567d227d353c6cbc2e378271ff
SHA3-384 hash: c282a2c6cfea19ec926c398ad5f9f675556e29840ec7dcff887d5105d4837fc93f7d1d8b7a81a3fc46d1ace86366caa8
SHA1 hash: 4984d677f493f4bb1d56214095b30874898725e4
MD5 hash: 6a5583838661534baddf08816e7d5600
humanhash: missouri-island-steak-wolfram
File name:1.vbs
Download: download sample
File size:1'127 bytes
First seen:2026-03-03 11:10:07 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 24:1r5HLDad1pYdoFu6derKWNmC0I+1wgo6ki2nHz9:FFDw8x1B/0ISkP
TLSH T18721AAACAC198247568873F8BBF38758CA61B6973D67AB642541CCE0271C42C9A603A3
Magika vba
Reporter BlinkzSec
Tags:150-241-66-66 vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
108
Origin country :
GB GB
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
obfuscated sload
Verdict:
Malicious
Labled as:
UDS_TrojanDownloader_VBS_SLoad_gen
Verdict:
Malicious
File Type:
vbs
Detections:
Trojan-Downloader.JS.SLoad.sb HEUR:Trojan-Downloader.VBS.SLoad.gen
Verdict:
Malware
YARA:
1 match(es)
Tags:
ADODB.Stream MSXML2.XMLHTTP VBScript Wscript.Shell
Verdict:
Malicious
Threat:
Trojan-Downloader.JS.SLoad
Threat name:
Script-WScript.Trojan.Heuristic
Status:
Malicious
First seen:
2026-03-02 00:39:59 UTC
File Type:
Text (VBS)
AV detection:
8 of 38 (21.05%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
adware discovery ransomware spyware
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Opens file in notepad (likely ransom note)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Time Discovery
Drops file in Windows directory
Checks computer location settings
Badlisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Visual Basic Script (vbs) vbs 7b75cfc8d8f78028f5cdc2f03e4aa7be1ad15e567d227d353c6cbc2e378271ff

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
commented on 2026-03-03 14:39:36 UTC

Payload URL:
http://150.241.66.66/NEMO777.txt