MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d761d4e70590ba7ef3e816a2749b58d1805d882e7c2b57dcfbbf3d68d673fc49. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ConnectWise


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: d761d4e70590ba7ef3e816a2749b58d1805d882e7c2b57dcfbbf3d68d673fc49
SHA3-384 hash: ed12fc62c5c3fa050839ac5e28267c89172ae3cd3ee85f85d87aacd55d35d7854607e26a0344af6e7223beeeb5d2f50d
SHA1 hash: 439790f438efbfaa7b2a6ddf41acd672f8b92d0e
MD5 hash: d190071e18f1e62d94aa5b0db74c1789
humanhash: steak-sixteen-oregon-alabama
File name:Scan_Document_xlsx.vbs
Download: download sample
Signature ConnectWise
File size:4'442 bytes
First seen:2026-02-27 17:09:55 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 96:nFxnFl+i/mQV7N02UctXWSNVuPi+cONTS+UH0ddxolS3bAx2:nDnai/mQV7N5tXHXkiUPdbN62
Threatray 1'549 similar samples on MalwareBazaar
TLSH T1F291A582778C0BA5BA5848D64258B90780F2D47D3A2521C9FBF17643F43DAB6FC68774
Magika vba
Reporter Anonymous
Tags:ConnectWise vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
50
Origin country :
US US
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
92.5%
Tags:
shellcode overt shell
Verdict:
Malicious
File Type:
vbs
Detections:
Trojan.Win32.Agent.sb HEUR:Trojan-Downloader.Script.Generic HEUR:Trojan.Script.Generic RemoteAdmin.ConnectWise.HTTP.C&C
Gathering data
Verdict:
Malicious
Threat:
RemoteAdmin.ConnectWise.HTTP
Threat name:
Script-WScript.Trojan.Nymeria
Status:
Malicious
First seen:
2026-02-27 02:36:40 UTC
File Type:
Text (VBS)
AV detection:
9 of 24 (37.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
backdoor discovery execution persistence privilege_escalation rat revoked_codesign
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Boot or Logon Autostart Execution: Authentication Package
Drops file in System32 directory
Command and Scripting Interpreter: PowerShell
Enumerates connected drives
Checks computer location settings
ConnectWise ScreenConnect remote access tool
Event Triggered Execution: Component Object Model Hijacking
Executes dropped EXE
Loads dropped DLL
Badlisted process makes network request
Binary is signed using a ConnectWise certificate revoked for key compromise.
Sets service image path in registry
Malware Config
Dropper Extraction:
http://192.158.232.90:8040/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments