MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7c6e56b9362f545d62c2bc2833df72b50858280027190459e72288abb9306118. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 7c6e56b9362f545d62c2bc2833df72b50858280027190459e72288abb9306118
SHA3-384 hash: 873f6a72151885ef4200da168126240d36d05be2e357da2ff8aee0f2259d65ddc5c17690f359ef7f5635c9d184762937
SHA1 hash: 1cca36cf0ac02f120104259f9806bcb350f9a07c
MD5 hash: 222ee00e12ecf54088fbecb26f801f59
humanhash: victor-carbon-bulldog-black
File name:KROPO_CLEAN.vbs
Download: download sample
File size:12'350 bytes
First seen:2022-05-08 03:23:44 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 96:zbxGT/ts1INOZWaZD8OZWaZ53HupkXqjxEQfjMO:zNGT/tsWKWapzWanH4kXQWQfYO
Threatray 61 similar samples on MalwareBazaar
TLSH T1DF42423B4B62C1E1913F00B5D503888ED0D6A4632B296366DD84F9D9E1ED1933FE91AF
Reporter petikvx
Tags:joke kropo vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
237
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
schtasks.exe wacatac
Result
Verdict:
MALICIOUS
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
68 / 100
Signature
Multi AV Scanner detection for submitted file
Potential malicious VBS script found (has network functionality)
Potential malicious VBS script found (suspicious strings)
System process connects to network (likely due to code injection or exploit)
Uses schtasks.exe or at.exe to add and modify task schedules
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 622127 Sample: KROPO_CLEAN.vbs Startdate: 08/05/2022 Architecture: WINDOWS Score: 68 27 Multi AV Scanner detection for submitted file 2->27 29 Potential malicious VBS script found (suspicious strings) 2->29 31 Potential malicious VBS script found (has network functionality) 2->31 8 wscript.exe 1 2->8         started        11 wscript.exe 1 2->11         started        process3 signatures4 33 System process connects to network (likely due to code injection or exploit) 8->33 35 Uses schtasks.exe or at.exe to add and modify task schedules 8->35 13 wscript.exe 159 165 8->13         started        17 schtasks.exe 1 8->17         started        process5 dnsIp6 25 kropo.hugii.repl.co 35.186.245.55, 443, 49758, 49762 GOOGLEUS United States 13->25 37 System process connects to network (likely due to code injection or exploit) 13->37 19 schtasks.exe 1 13->19         started        21 conhost.exe 17->21         started        signatures7 process8 process9 23 conhost.exe 19->23         started       
Threat name:
Script-WScript.Trojan.Heuristic
Status:
Malicious
First seen:
2022-05-02 05:00:00 UTC
File Type:
Text (VBS)
AV detection:
7 of 42 (16.67%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Creates scheduled task(s)
Modifies system certificate store
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Blocklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments