MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 df5e5e3138ed79f15b0aab5b091ca9809f9d839ee21a90d80a587e9cf2a13423. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ConnectWise


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: df5e5e3138ed79f15b0aab5b091ca9809f9d839ee21a90d80a587e9cf2a13423
SHA3-384 hash: 9b63a2560dcef36775ad73aea0cd7b199b72dd6210cbcc449151339e2acfaa546ea1feaba0c70a4a506c5bc5add6d5a1
SHA1 hash: 8fe9d22cb37456022fdfc7f884d4ab747067d8e2
MD5 hash: a67588428f0a77662d5fc44480e11db5
humanhash: princess-nitrogen-pip-white
File name:Google-meet installer.vbs
Download: download sample
Signature ConnectWise
File size:2'357 bytes
First seen:2026-02-22 14:08:25 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 24:PXCjMmu5FgKZhs3TcAzSG9QdW4ahMYkb9/ROMx1AWqSMqgX6pMxZcrkezaGoHJVi:PG3RjcAzpKdWzC71AWdMWQ4haGEs1
Threatray 1'442 similar samples on MalwareBazaar
TLSH T16B41755AFC0BA915C5B1C6D2B9267E0FEBA40417152060A8F91CC99ACB349BDDB7C1CF
Magika vba
Reporter juroots
Tags:ConnectWise vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
61
Origin country :
US US
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
90.2%
Tags:
dropper virus agent
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive expand lolbin msiexec rundll32 wscript
Verdict:
Malicious
File Type:
vbs
Detections:
HEUR:Trojan.VBS.SAgent.gen RemoteAdmin.ConnectWise.HTTP.C&C not-a-virus:HEUR:RemoteAdmin.VBS.Alien.gen
Verdict:
Malware
YARA:
1 match(es)
Tags:
ADODB.Stream Scripting.FileSystemObject Shell.Application VBScript WinHttp.WinHttpRequest.5.1 WScript.Shell
Threat name:
Script.Trojan.Heuristic
Status:
Malicious
First seen:
2026-02-20 13:20:59 UTC
File Type:
Text (VBS)
AV detection:
7 of 36 (19.44%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
backdoor discovery persistence privilege_escalation rat revoked_codesign
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Modifies registry class
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Boot or Logon Autostart Execution: Authentication Package
Drops file in System32 directory
Enumerates connected drives
Checks computer location settings
ConnectWise ScreenConnect remote access tool
Event Triggered Execution: Component Object Model Hijacking
Executes dropped EXE
Loads dropped DLL
Badlisted process makes network request
Binary is signed using a ConnectWise certificate revoked for key compromise.
Sets service image path in registry
Malware family:
ScreenConnect
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments