MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c3871dd901ea063aca86177df067f3d2a023fc6064d720ca5255e58e5cb02c2e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ConnectWise


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: c3871dd901ea063aca86177df067f3d2a023fc6064d720ca5255e58e5cb02c2e
SHA3-384 hash: 0cbc52b5ae65be96b492168fa9930dac4e208ea8c0773ef98f5014e38e7bcfab04418bc67da3166be63cf86623a14ae1
SHA1 hash: 0e153f6b6f61babf0150b4109ad318ed47d99cbe
MD5 hash: 3797fdf15ec21687fc2ce697d75a25f5
humanhash: grey-mockingbird-fish-mango
File name:quote3563.vbs
Download: download sample
Signature ConnectWise
File size:2'340 bytes
First seen:2026-02-03 17:35:28 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 24:PXCjMmu5FgKZhs3TcGlIzSG9QdW4ahMYkb9/ROMx1AWqSMqgX6pMxZcrkezaGoH+:PG3RjcGGzpKdWzC71AWdMWQ4haGEs1
Threatray 1'308 similar samples on MalwareBazaar
TLSH T1AE41755AFD0BA91AC5B1C2D2B9267E0FEBA4041715206068F94CD999CB349BCDB7C1CF
Magika vba
Reporter Anonymous
Tags:ConnectWise vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
52
Origin country :
US US
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
90.2%
Tags:
shellcode phishing dropper spawn
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive expand lolbin msiexec rundll32 wscript
Verdict:
Adware
File Type:
vbs
First seen:
2026-01-29T16:33:00Z UTC
Last seen:
2026-01-29T16:48:00Z UTC
Hits:
~10
Detections:
not-a-virus:HEUR:RemoteAdmin.VBS.Alien.gen
Gathering data
Threat name:
Script.Trojan.Heuristic
Status:
Malicious
First seen:
2026-01-29 19:35:53 UTC
File Type:
Text (VBS)
AV detection:
4 of 24 (16.67%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
backdoor discovery persistence privilege_escalation rat revoked_codesign
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Modifies registry class
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Boot or Logon Autostart Execution: Authentication Package
Drops file in System32 directory
Enumerates connected drives
Checks computer location settings
ConnectWise ScreenConnect remote access tool
Event Triggered Execution: Component Object Model Hijacking
Executes dropped EXE
Loads dropped DLL
Badlisted process makes network request
Binary is signed using a ConnectWise certificate revoked for key compromise.
Sets service image path in registry
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments