top title background image
flash

Re-RFQ - PN List.vbs

Status: finished
Submission Time: 2022-05-16 19:26:15 +02:00
Malicious
Trojan
Exploiter
Evader
AsyncRAT, DcRat

Comments

Tags

  • vbs

Details

  • Analysis ID:
    627719
  • API (Web) ID:
    995223
  • Analysis Started:
    2022-05-16 19:28:00 +02:00
  • Analysis Finished:
    2022-05-16 19:41:21 +02:00
  • MD5:
    867aa07dd614380e5943bccd70fee675
  • SHA1:
    b97d664bc1f9f8f3ba2819f17154e4d32618734c
  • SHA256:
    35d11d86e996833469ee713fce6ba52dbcdcf3211e36985182f47040c2166ac9
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 5/41
malicious

IPs

IP Country Detection
148.72.177.212
United States
91.193.75.216
Serbia
199.102.48.248
United States

Domains

Name IP Detection
textbin.net
148.72.177.212
sky01.publicvm.com
91.193.75.216
SQL8003.site4now.net
199.102.48.248

URLs

Name Detection
https://textbin.net/raw/gia9ab2dg0
https://textbin.net
http://nuget.org/NuGet.exe
Click to see the 11 hidden entries
http://pesterbdd.com/images/Pester.png
http://www.apache.org/licenses/LICENSE-2.0.html
https://go.micro
https://contoso.com/
https://nuget.org/nuget.exe
https://contoso.com/License
https://contoso.com/Icon
sky01.publicvm.com
https://textbin.net/raw/gia9ab2dg00y
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://github.com/Pester/Pester

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SystemLogin.vbs
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\lvvchi0q\lvvchi0q.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\5arm45ue\5arm45ue.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 25 hidden entries
C:\Users\user\AppData\Local\Temp\lvvchi0q\lvvchi0q.0.cs
C++ source, UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\Public\gia9ab2dg0.PS1
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5bbucvlc.1j2.ps1
very short file (no magic)
#
C:\Users\user\Documents\20220516\PowerShell_transcript.841618.f5mU45le.20220516192941.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20220516\PowerShell_transcript.841618.RBBMNgBb.20220516193001.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20220516\PowerShell_transcript.841618.MEqVT+yD.20220516192930.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\lvvchi0q\lvvchi0q.out
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
#
C:\Users\user\AppData\Local\Temp\lvvchi0q\lvvchi0q.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\lvvchi0q\CSCF59D68E9AEF44B30A0A5857885C9A6E.TMP
MSVC .res
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q0t1u4d1.0tt.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mkzpdbdk.wsu.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jrik5clw.pjd.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c1efweqf.5aa.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1g4lgrl3.ws0.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\RESC9E1.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x496, 9 symbols
#
C:\Users\user\AppData\Local\Temp\RES14F3.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ce, 9 symbols
#
C:\Users\user\AppData\Local\Temp\5arm45ue\CSC76D3F8E3C7D44B4EA91093B17CA01E8C.TMP
MSVC .res
#
C:\Users\user\AppData\Local\Temp\5arm45ue\5arm45ue.out
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
#
C:\Users\user\AppData\Local\Temp\5arm45ue\5arm45ue.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\5arm45ue\5arm45ue.0.cs
C++ source, UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61480 bytes, 1 file
#