top title background image
flash

invoice.vbs

Status: finished
Submission Time: 2021-08-03 22:55:16 +02:00
Malicious
Trojan
Evader
AsyncRAT

Comments

Tags

  • vbs

Details

  • Analysis ID:
    458958
  • API (Web) ID:
    826527
  • Analysis Started:
    2021-08-03 22:55:17 +02:00
  • Analysis Finished:
    2021-08-03 23:03:45 +02:00
  • MD5:
    8a757e0b2f51327cc27b6fdba4ffd404
  • SHA1:
    67cfc2866f5e88bb2daf4a84de61835b940266a1
  • SHA256:
    56073b63e9b1c977aab82d11f1bf9098a78b16f99158a95810d2d21df097e164
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

IPs

IP Country Detection
162.159.130.233
United States

Domains

Name IP Detection
cdn.discordapp.com
162.159.130.233
ahmed2611.linkpc.net
0.0.0.0

URLs

Name Detection
https://go.micro
https://github.com/Pester/Pester
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Click to see the 15 hidden entries
http://csoft.com/pki/crls/MicRooCerAut_2
https://contoso.com/Icon
https://contoso.com/License
https://nuget.org/nuget.exe
https://contoso.com/
http://schemas.xmlsoap.org/wsdl/
http://nuget.org/NuGet.exe
http://crl.microsof
http://www.apache.org/licenses/LICENSE-2.0.html
ahmed2611.linkpc.net
http://schemas.xmlsoap.org/soap/encoding/
http://pesterbdd.com/images/Pester.png
https://cdn.discordapp.com/attachments/833416270924742669/869658503759937606/dola2021.txt
https://cdn.discordapp.comx
https://cdn.discordapp.com/attachments/833416270924742669/869658269294137374/dola2020.txt

Dropped files

Name File Type Hashes Detection
C:\Users\user\Documents\20210803\PowerShell_transcript.019635.jcVtHXYn.20210803225606.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
#
C:\Users\Public\Run\Run.vbs
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
Click to see the 3 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_evfblz0q.2mw.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ttgqezgt.k4l.ps1
very short file (no magic)
#