Summary | ZeroBOX

loader.vbs

Category Machine Started Completed
FILE s1_win7_x6403_us March 28, 2025, 9:28 a.m. March 28, 2025, 9:34 a.m.
Size 940.0B
Type UTF-8 Unicode text, with CRLF line terminators
MD5 cae91a547e1f1f9340d8856b5b1ffd07
SHA256 aeb04690e950c382b02ccfc85370d5fd7f814bc8160350ee5daa6152dcd18c1e
CRC32 7DF518A2
ssdeep 24:9AKpLr2KjwGzll9LONnhQrq9t7mBIHyyY0HVW:eoLrlgydwhbs
Yara None matched

IP Address Status Action
159.203.148.75 Active Moloch
164.124.101.2 Active Moloch
20.200.245.247 Active Moloch

Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\win_init.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\win_init.exe
0 0
Skyhigh BehavesLike.VBS.Dropper.xp
Symantec ISB.Downloader!gen60
ESET-NOD32 VBS/TrojanDownloader.Agent.PHZ
Kaspersky HEUR:Trojan-Downloader.Script.Generic
NANO-Antivirus Trojan.Script.Vbs-heuristic.druvzi
Ikarus Trojan-Downloader.VBS.Agent
Google Detected
Yandex HTML.Psyme.Gen
Fortinet VBS/Agent.RNN!tr.dldr
Time & API Arguments Status Return Repeated

WSASend

buffer: migåí-+H‰R沝‘ÒÞÈ n¦ÕÏßÀ/sjÿ/5 ÀÀÀ À 28(ÿ github.com  
socket: 532
0 0

WSASend

buffer: 51gåí-ý¶Þÿ`ÈÚ9î¿À]ší‡°C…Š×"­ÛÁc  ÿ
socket: 532
0 0

InternetCrackUrlW

url: https://ntfy.sh/dillertus77
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 81788928
http_method: POST
referer:
path: /dillertus77
1 13369356 0
Time & API Arguments Status Return Repeated

WSASend

buffer: migåí-+H‰R沝‘ÒÞÈ n¦ÕÏßÀ/sjÿ/5 ÀÀÀ À 28(ÿ github.com  
socket: 532
0 0

WSASend

buffer: 51gåí-ý¶Þÿ`ÈÚ9î¿À]ší‡°C…Š×"­ÛÁc  ÿ
socket: 532
0 0

InternetCrackUrlW

url: https://ntfy.sh/dillertus77
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 81788928
http_method: POST
referer:
path: /dillertus77
1 13369356 0

send

buffer: !
socket: 1216
sent: 1
1 1 0

send

buffer: jfgåí.DÒN‚‚Ò±,~f֙ø™ãƒù<¢ ¦È@¤;ÿø/5 ÀÀÀ À 28%ÿ ntfy.sh  
socket: 1304
sent: 111
1 111 0

send

buffer: !
socket: 1216
sent: 1
1 1 0

send

buffer: !
socket: 1216
sent: 1
1 1 0

send

buffer: jfgåí/¼k¬¤á0SL«_Pg¶(ñÑf¬³°²ÊâÝ/5 ÀÀÀ À 28%ÿ ntfy.sh  
socket: 1304
sent: 111
1 111 0

send

buffer: !
socket: 1216
sent: 1
1 1 0

send

buffer: !
socket: 1216
sent: 1
1 1 0

send

buffer: 51gåí/ÐÊ)õp +_!Ïgp™l.¶¡ZôÒùz  ÿ
socket: 1304
sent: 58
1 58 0

send

buffer: !
socket: 1216
sent: 1
1 1 0

send

buffer: !
socket: 1216
sent: 1
1 1 0
parent_process wscript.exe martian_process C:\Users\test22\AppData\Local\Temp\win_init.exe
file C:\Users\test22\AppData\Local\Temp\win_init.exe