Advertisement
paladin316

02049_029_00_vbs_2019-07-18_16_30.txt

Sep 4th, 2019
1,361
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.23 KB | None | 0 0
  1.  
  2. * MalFamily: "Sonbokli"
  3.  
  4. * MalScore: 1.8
  5.  
  6. * File Name: "02049_029_00.vbs"
  7. * File Size: 9741
  8. * File Type: "ASCII text, with very long lines, with CRLF line terminators"
  9. * SHA256: "6219d0720feffdee741f74e4fa0ceddf7f90890a2e20a42aa525df3413a59462"
  10. * MD5: "244ae81e601e6a7713020cff63a430a9"
  11. * SHA1: "fb49ee2fc085aff3db2ccebb6602cafcb6e5722a"
  12. * SHA512: "ecfccf67196ebe94bac56e9959c9611e10ec21b0409a6875143dc08a6cec72e0b5d2b325274cb10a04ffb982e4d33611394e98e0d848827e2750b1641238047b"
  13. * CRC32: "21E46E2D"
  14. * SSDEEP: "192:BqivLl+ioy1AZDdk33vvY9Wcdkij/ZKeiE55QVmd0mheubpq:ciTwjy1Avk3fWW6kij/4eiuQVl"
  15.  
  16. * Process Execution:
  17. "wscript.exe",
  18. "iuceN.exe"
  19.  
  20.  
  21. * Executed Commands:
  22. "C:\\Users\\user\\AppData\\Local\\Temp\\iuceN.exe"
  23.  
  24.  
  25. * Signatures Detected:
  26.  
  27. "Description": "Attempts to connect to a dead IP:Port (1 unique times)",
  28. "Details":
  29.  
  30. "IP": "67.23.226.163:80"
  31.  
  32.  
  33.  
  34.  
  35. "Description": "File has been identified by 4 Antiviruses on VirusTotal as malicious",
  36. "Details":
  37.  
  38. "Rising": "Trojan.Obfus/VBS!1.B96F (CLASSIC)"
  39.  
  40.  
  41. "Microsoft": "Trojan:VBS/Sonbokli.A!cl"
  42.  
  43.  
  44. "Fortinet": "VBS/Agent.RPQ!tr.dldr"
  45.  
  46.  
  47. "Qihoo-360": "virus.vbs.qexvmc.1100"
  48.  
  49.  
  50.  
  51.  
  52. "Description": "Performs some HTTP requests",
  53. "Details":
  54.  
  55. "url": "http://www.eloka.com/www/images/flash_downloader.php"
  56.  
  57.  
  58.  
  59.  
  60. "Description": "Drops a binary and executes it",
  61. "Details":
  62.  
  63. "binary": "C:\\Users\\user\\AppData\\Local\\Temp\\iuceN.exe"
  64.  
  65.  
  66.  
  67.  
  68.  
  69. * Started Service:
  70.  
  71. * Mutexes:
  72.  
  73. * Modified Files:
  74. "C:\\Users\\user\\AppData\\Local\\Temp\\iuceN.exe",
  75. "C:\\ProgramData\\\\xd0\\xb5\\xd0\\xb5\\xd0\\x95\\xd0\\xb0\\xd0\\x90\\xd1\\x85\\xd1\\x85\\xd0\\x92\\xd0\\x9e\\xd0\\xb5\\xd0\\x95\\xd0\\xb0\\xd0\\xbe.exe"
  76.  
  77.  
  78. * Deleted Files:
  79.  
  80. * Modified Registry Keys:
  81.  
  82. * Deleted Registry Keys:
  83.  
  84. * DNS Communications:
  85.  
  86. "type": "A",
  87. "request": "www.eloka.com",
  88. "answers":
  89.  
  90. "data": "67.23.226.163",
  91. "type": "A"
  92.  
  93.  
  94. "data": "eloka.com",
  95. "type": "CNAME"
  96.  
  97.  
  98.  
  99.  
  100.  
  101. * Domains:
  102.  
  103. "ip": "67.23.226.163",
  104. "domain": "www.eloka.com"
  105.  
  106.  
  107.  
  108. * Network Communication - ICMP:
  109.  
  110. * Network Communication - HTTP:
  111.  
  112. "count": 1,
  113. "body": "",
  114. "uri": "http://www.eloka.com/www/images/flash_downloader.php",
  115. "user-agent": "Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)",
  116. "method": "GET",
  117. "host": "www.eloka.com",
  118. "version": "1.1",
  119. "path": "/www/images/flash_downloader.php",
  120. "data": "GET /www/images/flash_downloader.php HTTP/1.1\r\nConnection: Keep-Alive\r\nAccept: */*\r\nAccept-Language: en-us\r\nUser-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)\r\nHost: www.eloka.com\r\n\r\n",
  121. "port": 80
  122.  
  123.  
  124.  
  125. * Network Communication - SMTP:
  126.  
  127. * Network Communication - Hosts:
  128.  
  129. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement