flash

Richiesta urgente.vbs

Status: finished
Submission Time: 2022-11-28 11:04:09 +01:00
Malicious
Trojan
Spyware
Exploiter
Evader
AgentTesla, GuLoader

Comments

Tags

  • vbs

Details

  • Analysis ID:
    755115
  • API (Web) ID:
    1122398
  • Analysis Started:
    2022-11-28 11:04:10 +01:00
  • Analysis Finished:
    2022-11-28 11:15:43 +01:00
  • MD5:
    de0edf01710a38b1e96688ae2f712ebb
  • SHA1:
    6791a70cf79c415ba109e86734bcfd1b4930ec31
  • SHA256:
    20796159ce1191fe88603ee4be1855bca614bcb29161d149a6990b48589d88c5
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
9/91

IPs

IP Country Detection
162.240.62.179
United States
185.31.121.136
Bulgaria

Domains

Name IP Detection
qwedft.gq
162.240.62.179
ftp.mcmprint.net
185.31.121.136

URLs

Name Detection
ftp://ftp.mcmprint.netnoffice
https://contoso.com/
https://github.com/Pester/Pester
Click to see the 16 hidden entries
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://crl.micr
http://OowQOv.com
https://contoso.com/Icon
http://DynDns.comDynDNSnamejidpasswordPsi/Psi
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
https://contoso.com/License
https://nuget.org/nuget.exe
http://qwedft.gq/nnslx/arPdDEHecKTUsOQSyN133.asi
https://go.micro
http://www.apache.org/licenses/LICENSE-2.0.html
http://pesterbdd.com/images/Pester.png
http://3LpbHlMRrrHdHc2KU.net
http://crl.m
http://nuget.org/NuGet.exe
http://127.0.0.1:HTTP/1.1

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\2vgl23kr\2vgl23kr.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (368), with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Temp\2vgl23kr\2vgl23kr.0.cs
Unicode text, UTF-8 (with BOM) text, with very long lines (1303), with no line terminators
#
Click to see the 7 hidden entries
C:\Users\user\AppData\Local\Temp\2vgl23kr\2vgl23kr.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\2vgl23kr\2vgl23kr.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
#
C:\Users\user\AppData\Local\Temp\2vgl23kr\CSC2C40FF502EE54A39B5D71CE974C4B10.TMP
MSVC .res
#
C:\Users\user\AppData\Local\Temp\RESA66C.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Mon Nov 28 19:06:44 2022, 1st section name ".debug$S"
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_newj5tcw.yq1.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qdv1nroa.nix.ps1
very short file (no magic)
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#