MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 85100391f5a8f5a52423dce2c291b0bd19ee21e52c2c5e8cc29e4cb11d4d49b3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 85100391f5a8f5a52423dce2c291b0bd19ee21e52c2c5e8cc29e4cb11d4d49b3
SHA3-384 hash: f451e17264c28dafda99f0034b3a1d801b99aa316336910b50de8ecdaf4bcaccbbd819f99b5e1b719ff75e58c14fdf87
SHA1 hash: ff2dd06b374d250264ed6e5679959efdd33d7313
MD5 hash: ed318f421d5ff370fbb0cf1a0a4bf740
humanhash: artist-island-triple-asparagus
File name:G1.vbs
Download: download sample
File size:1'154 bytes
First seen:2026-03-17 14:16:59 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 24:L0wUFewpPZg18aJx+8ycWOyRV76BIz8OW22wryphKGEP:96eAg1bJx+HbRgKBW2RgEP
TLSH T11B2163112C4AC1E0F2B39DD6941B554DF5EAA08302378C2B7E0ED9CA0F3038D02F2678
Magika vba
Reporter Anonymous
Tags:vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
147
Origin country :
US US
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
81.4%
Tags:
infosteal xtreme shell sage
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
lolbin msiexec obfuscated powershell
Verdict:
Malicious
File Type:
vbs
Detections:
HEUR:Trojan.Script.Generic HEUR:Trojan-Downloader.Script.Generic
Verdict:
Malware
YARA:
1 match(es)
Tags:
ADODB.Stream MSXML2.DOMDocument.3.0 VBScript
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2026-03-17 13:49:57 UTC
File Type:
Text (VBS)
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
backdoor defense_evasion discovery execution persistence privilege_escalation rat spyware trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Checks system information in the registry
Drops file in System32 directory
Badlisted process makes network request
Checks installed software on the system
Enumerates connected drives
Checks BIOS information in registry
Checks computer location settings
Detects GoToResolve remote administration tool
Event Triggered Execution: Component Object Model Hijacking
Executes dropped EXE
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments