MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f8520d764363ff22784c2bd6f77829ffe7396637936d68855bf56ae1f0c6dd5e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Grandoreiro


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: f8520d764363ff22784c2bd6f77829ffe7396637936d68855bf56ae1f0c6dd5e
SHA3-384 hash: 334c3696d6af940bba26f294a2f7ee159a8f4d475630a50e90776c6d3c81b809935458167d1af7fe49fe7c153d777bbf
SHA1 hash: 117163fbe969960166af9d68f519cf975aa223c8
MD5 hash: 67c2e775c3447ed3cd210f615ad84ac5
humanhash: connecticut-mockingbird-nineteen-mockingbird
File name:672365339196e.vbs
Download: download sample
Signature Grandoreiro
File size:712 bytes
First seen:2024-10-31 11:16:58 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 12:k1xLJWCH/4UYhWihsFpC4AZ7FXZ3s8eVl5u4SrZHw4SlHB:k1RzHw/sFHAhEf5lSrVS7
TLSH T1AB01C043E70D838486194BC000216058F39CD62D1C72C91DF31ABABF34B80F42D9A2AD
Magika vba
Reporter NDA0E
Tags:geo Grandoreiro MEX PRT vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
77
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
81.4%
Tags:
powershell infosteal
Result
Verdict:
UNKNOWN
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Benign windows process drops PE files
Connects to many ports of the same IP (likely port scanning)
Excessive usage of taskkill to terminate processes
Multi AV Scanner detection for dropped file
Overwrites code with function prologues
Potential malicious VBS script found (has network functionality)
Queries sensitive battery information (via WMI, Win32_Battery, often done to detect virtual machines)
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
System process connects to network (likely due to code injection or exploit)
Tries to access browser extension known for cryptocurrency wallets
Uses ipconfig to lookup or modify the Windows network settings
Uses known network protocols on non-standard ports
Uses ping.exe to check the status of other devices and networks
VBScript performs obfuscated calls to suspicious functions
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1546041 Sample: 672365339196e.vbs Startdate: 31/10/2024 Architecture: WINDOWS Score: 100 81 tgb5255365e.servegame.com 2->81 83 worldtimeapi.org 2->83 85 endesa.click 2->85 99 Multi AV Scanner detection for dropped file 2->99 101 Connects to many ports of the same IP (likely port scanning) 2->101 103 Uses known network protocols on non-standard ports 2->103 105 4 other signatures 2->105 12 wscript.exe 1 2->12         started        signatures3 process4 signatures5 125 Benign windows process drops PE files 12->125 127 VBScript performs obfuscated calls to suspicious functions 12->127 129 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->129 131 Suspicious execution chain found 12->131 15 cmd.exe 3 2 12->15         started        17 cmd.exe 1 12->17         started        19 cmd.exe 12->19         started        process6 process7 21 wscript.exe 1 23 15->21         started        26 conhost.exe 15->26         started        28 curl.exe 2 17->28         started        30 conhost.exe 17->30         started        32 conhost.exe 19->32         started        34 wscript.exe 19->34         started        dnsIp8 91 64.95.10.38, 49713, 80 BRAHMAN-NYUS United States 21->91 73 C:\_672365339188b\unrar.dll, PE32 21->73 dropped 75 C:\_672365339188b\BLOCKBUSTER.exe, PE32 21->75 dropped 77 C:\_672365339188b\7zxa.dll, PE32 21->77 dropped 113 System process connects to network (likely due to code injection or exploit) 21->113 115 Windows Scripting host queries suspicious COM object (likely to drop second stage) 21->115 36 BLOCKBUSTER.exe 2 7 21->36         started        93 127.0.0.1 unknown unknown 28->93 95 endesa.click 68.65.122.45, 443, 49712 NAMECHEAP-NETUS United States 28->95 79 C:\Users\Public\6723653391970.vbs, ASCII 28->79 dropped 117 Potential malicious VBS script found (has network functionality) 28->117 file9 signatures10 process11 dnsIp12 87 tgb5255365e.servegame.com 70.34.247.142 RAZOR-PHLUS United States 36->87 89 worldtimeapi.org 213.188.196.246 TELIA-NORWAY-ASTeliaNorwayCoreNetworksNO Italy 36->89 71 C:\Users\user\AppData\Local\Temp\hcx.dll, PE32 36->71 dropped 107 Queries sensitive battery information (via WMI, Win32_Battery, often done to detect virtual machines) 36->107 109 Overwrites code with function prologues 36->109 111 Tries to access browser extension known for cryptocurrency wallets 36->111 41 cmd.exe 1 36->41         started        44 cmd.exe 36->44         started        46 cmd.exe 36->46         started        48 11 other processes 36->48 file13 signatures14 process15 signatures16 119 Uses ping.exe to check the status of other devices and networks 41->119 121 Uses ipconfig to lookup or modify the Windows network settings 41->121 123 Excessive usage of taskkill to terminate processes 41->123 50 taskkill.exe 1 41->50         started        53 conhost.exe 41->53         started        61 3 other processes 41->61 55 PING.EXE 44->55         started        57 conhost.exe 44->57         started        63 3 other processes 44->63 59 conhost.exe 46->59         started        65 4 other processes 46->65 67 29 other processes 48->67 process17 signatures18 97 Queries sensitive battery information (via WMI, Win32_Battery, often done to detect virtual machines) 50->97 69 Conhost.exe 55->69         started        process19
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2024-10-31 11:17:10 UTC
File Type:
Text (VBS)
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery evasion persistence privilege_escalation
Behaviour
Modifies registry class
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Event Triggered Execution: Netsh Helper DLL
System Location Discovery: System Language Discovery
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Blocklisted process makes network request
Modifies Windows Firewall
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_tiny_vbs
Author:daniyyell
Description:Detects tiny VBS delivery technique

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via web download

Comments