MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9b3296db81da2719713c5af6ad8a09213f7c676f0cc6858174a63a2cfa4f387d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 9b3296db81da2719713c5af6ad8a09213f7c676f0cc6858174a63a2cfa4f387d
SHA3-384 hash: 095cafc4eadc3b79f0ca4f23e66da31fb2fb621e72609a8a7aa3e33c339f76ba1016c8c86b69ab96f682831482a76643
SHA1 hash: cdee7f039a4edc3719d837986ea9ee9deed01e74
MD5 hash: 8d79179a4eb8e66f8c7c581b051ae515
humanhash: maine-video-maryland-don
File name:Statement-03-2026.vbs
Download: download sample
File size:1'456 bytes
First seen:2026-04-28 18:23:08 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 24:Tb47c+wLldus3x9+y/DWHSfKKE2+bSKpH/7TUo3yNRRKqah7khvCwABMeCAAH:3BTB9+3z32+ZMo3+Ri7avT+CAAH
Threatray 1'911 similar samples on MalwareBazaar
TLSH T1A031125EFD0AC8835F73DAB666618E3DCEB14223582095547A81CC943F2933C4AED693
Magika vba
Reporter Anonymous
Tags:vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
75
Origin country :
US US
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
expand lolbin lolbin masquerade msiexec rundll32 wscript
Verdict:
Clean
File Type:
vbs
First seen:
2026-04-29T16:33:00Z UTC
Last seen:
2026-04-30T01:42:00Z UTC
Hits:
~10
Gathering data
Threat name:
Win32.Trojan.Malgent
Status:
Malicious
First seen:
2026-04-28 17:25:26 UTC
File Type:
Text (VBS)
AV detection:
7 of 24 (29.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
backdoor discovery persistence privilege_escalation rat revoked_codesign
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Boot or Logon Autostart Execution: Authentication Package
Drops file in System32 directory
Enumerates connected drives
Checks computer location settings
ConnectWise ScreenConnect remote access tool
Event Triggered Execution: Component Object Model Hijacking
Executes dropped EXE
Loads dropped DLL
Badlisted process makes network request
Sets service image path in registry
Signed with revoked ConnectWise certificate
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments