Summary | ZeroBOX

msg_19_12_01384462651-7272716591.vbs

Category Machine Started Completed
FILE s1_win7_x6402 June 25, 2021, 2:04 p.m. June 25, 2021, 2:07 p.m.
Size 4.9KB
Type ASCII text, with CRLF line terminators
MD5 861f2ecb29c3bd4ab3e1a13f10422e5d
SHA256 3b931f0f86495e020d9c7c7029a7887e4e631dd7331341c1ac0fa4119103f982
CRC32 3816D2EE
ssdeep 96:SixZv/u/s/YjiVrJWC/pn2hNEp+TgTP4+by0TUkMKNNFD3qJUBm+Vx5O6di:D5/u/s/YjiVFWC/pn2TEpTg+jwkMYjqj
Yara None matched

IP Address Status Action
153.122.177.219 Active Moloch
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

request GET http://2-wave.com/MjdyeUHS32?
host 172.217.25.14
Time & API Arguments Status Return Repeated

InternetCrackUrlW

url: http://intra.cfecgcaquitaine.com/MjdyeUHS32?
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 4194304
http_method: GET
referer:
path: /MjdyeUHS32?
1 13369356 0

InternetCrackUrlW

url: http://depomedikal.com/MjdyeUHS32?
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 4194304
http_method: GET
referer:
path: /MjdyeUHS32?
1 13369356 0

InternetCrackUrlW

url: http://2-wave.com/MjdyeUHS32?
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0010
http_version:
flags: 4194304
http_method: GET
referer:
path: /MjdyeUHS32?
1 13369364 0

InternetReadFile

buffer: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /MjdyeUHS32 was not found on this server.</p> <hr> <address>Apache/2.2.3 (CentOS) Server at 2-wave.com Port 80</address> </body></html>
request_handle: 0x00cc0014
1 1 0
Time & API Arguments Status Return Repeated

InternetCrackUrlW

url: http://intra.cfecgcaquitaine.com/MjdyeUHS32?
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 4194304
http_method: GET
referer:
path: /MjdyeUHS32?
1 13369356 0

InternetCrackUrlW

url: http://depomedikal.com/MjdyeUHS32?
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 4194304
http_method: GET
referer:
path: /MjdyeUHS32?
1 13369356 0

InternetCrackUrlW

url: http://2-wave.com/MjdyeUHS32?
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0010
http_version:
flags: 4194304
http_method: GET
referer:
path: /MjdyeUHS32?
1 13369364 0

send

buffer: !
socket: 800
sent: 1
1 1 0

send

buffer: GET /MjdyeUHS32? HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; .NET4.0E) Host: 2-wave.com Connection: Keep-Alive
socket: 908
sent: 299
1 299 0

send

buffer: !
socket: 800
sent: 1
1 1 0
MicroWorld-eScan VB:Trojan.VBS.Agent.AQN
CAT-QuickHeal Trojan.VBS.GIRansom.4537
McAfee VBS/Downloader.ea
Arcabit VB:Trojan.VBS.Agent.AQN
Cyren VBS/Downldr.HM
Symantec VBS.Downloader.B
ESET-NOD32 VBS/TrojanDownloader.Agent.PLS
TrendMicro-HouseCall VBS_SCARAB.SMJS02
Kaspersky HEUR:Trojan.Script.Agent.gen
BitDefender VB:Trojan.VBS.Agent.AQN
NANO-Antivirus Trojan.Script.ExpKit.ewjogg
AegisLab Troj.Script.Agent!c
Ad-Aware VB:Trojan.VBS.Agent.AQN
Emsisoft VB:Trojan.VBS.Agent.AQN (B)
Comodo UnclassifiedMalware
F-Secure VB:Trojan.VBS.Agent.AQN
DrWeb VBS.DownLoader.1051
TrendMicro VBS_SCARAB.SMJS02
McAfee-GW-Edition VBS/Downloader.ea
Sophos Troj/VBSDldr-T
F-Prot VBS/Downldr.HM
Avira VBS/Drldr.Agent.4368
Antiy-AVL Trojan[Downloader]/VBS.Agent.pkq
Microsoft TrojanDownloader:VBS/Schopets.O
ViRobot VBS.Downloader.4971
ZoneAlarm HEUR:Trojan.Script.Agent.gen
GData Script.Trojan-Downloader.Agent.AEZ
AhnLab-V3 VBS/Downloader
ALYac VB:Trojan.VBS.Agent.AQN
MAX malware (ai score=100)
Rising Downloader.Schopets!8.EAAB (TOPIS:9cv31yapexE)
Ikarus Trojan-Ransom.Script.GlobeImposter
Fortinet VBS/Agent.PLT!tr.dldr