Defending against cyber threats amid Israel-Iran geopolitical tensions. Learn More

Defending against cyber threats amid Israel-Iran geopolitical tensions. Learn More

Services
Cyber Advisory
Managed Cloud Security
Data Security
Managed Detection & Response
Email Security
Managed Network Infrastructure Security
Exposure Management
Security Operations Platforms
Incident Readiness & Response
SpiderLabs Threat Intelligence
Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft Security
Unlock the full power of Microsoft Security
Securing the IoT Landscape
Test, monitor and secure network objects
Why LevelBlue
About Us
Awards and Accolades
LevelBlue SpiderLabs
PGA of America Partnership
Secure What's Next
LevelBlue Security Operations Platforms
Security Colony
Partners
Microsoft
Unlock the full power of Microsoft Security
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings

Tracing a Multi-Vector Malware Campaign: From VBS to Open Infrastructure 

Recently LevelBlue SpiderLabs initiated an investigation into a multi-stage malware delivery campaign initially identified from LevelBlue’s MDR SOC through a SentinelOne detection of a suspicious Visual Basic Script (VBS) file.

While the endpoint protection controls successfully prevented execution of the file, further analysis of the decoded script revealed a fileless loader leveraging Unicode obfuscation, PNG-based payload staging, and a reflectively loaded .NET execution method commonly referred to as the VAI loader .

Continued investigation of the associated artifacts exposed an open-directory attacker architecture hosting multiple similarly obfuscated VBS files, each mapping to different malware payloads, including variations of XWorm and remote access trojans such as Remcos RAT.

Further review uncovered a secondary infection vector hosted within the same infrastructure, involving a weaponized “PDF” and batch script that resulted in further malicious payload deployment and outbound network activity.

Collectively, these findings indicate the activity was not an isolated endpoint event, but part of a broader, reusable malware framework designed to support multiple payloads and delivery mechanisms.

This report outlines the initial detection, subsequent script analysis, infrastructure discovery, and the associated risks and indicators observed during the investigation.

 

Initial Detection and SOC Triage

The investigation created by LevelBlue’s MDR SOC originated from a SentinelOne detection identifying a suspicious VBS file, Name_File.vbs. The file was observed in the \Users\Public\Downloads\ directory. SentinelOne successfully terminated and quarantined the file under an enforced Protect/Protect policy before execution could complete.

Initial triage conducted by the SOC determined that the file hash did not have an established reputation in available OSINT sources, and no additional detections or related activity were identified within the environment’s historical telemetry. At the time of detection, the activity appeared isolated to a single endpoint.

As part of the triage process, SentinelOne telemetry captured the decoded command-line activity associated with the VBS file, revealing a Base64-encoded PowerShell command. While the initial containment prevented further execution on the affected host, the presence of encoded script content and external network references warranted additional analysis to better understand the intent and potential scope of the activity.

Based on these findings, the investigation transitioned from endpoint-level triage to a deeper analysis of the VBS script and its associated execution logic by LevelBlue’s Cyber Threat Intelligence team to determine whether the activity represented a standalone incident or part of a broader threat campaign.

 

Decoded VBS Analysis and Loader Behavior

Following initial containment, analysis shifted to the contents and behavior of the detected VBS file to better understand its execution flow and intent. A review of the script revealed that the VBS primarily functioned as an obfuscated launcher, responsible for decoding and executing a secondary PowerShell payload rather than containing the malicious logic directly.

 

Obfuscated VBS Execution

Figure 1. Name_File.vbs content
Figure 1. Name_File.vbs content

Figure 2. Name_File.vbs Unicode removal
Figure 2. Name_File.vbs Unicode removal

Figure 3. Name_File.vbs encoded script after Unicode removal
Figure 3. Name_File.vbs encoded script after Unicode removal

The VBS script employed heavy Unicode-based obfuscation to conceal its true functionality and evade static inspection. Once decoded, the script was observed to reconstruct and execute a Base64-encoded PowerShell command. This approach allowed the attacker to minimize visible malicious content within the script itself while deferring core functionality to runtime.

 

Fileless PowerShell Loader Behavior

Figure 4. Name_File.vbs decoded PowerShell command
Figure 4. Name_File.vbs decoded PowerShell command

The decoded PowerShell command exhibited behavior consistent with a fileless malware loader. It explicitly enforced the use of TLS 1.2 and leveraged the Net.WebClient class to retrieve remote content over HTTP. The first URL we analyzed in this script was as follows:

hxxp://ia600606.us.archive[.]org/11/items/msi-pro-with-b-64_20251030/MSI_PRO_with_b64.png

Rather than downloading a traditional executable, the script fetches a PNG file (MSI_PRO_with_b64.png) from the first URL above and searches its contents for embedded data found by custom BaseStart and BaseEnd markers.

Figure 5. MSI_PRO_with_b64.png
Figure 5. MSI_PRO_with_b64.png

Figure 6. MSI_PRO_with_b64.png BaseStart
Figure 6. MSI_PRO_with_b64.png BaseStart

Figure 6. MSI_PRO_with_b64 BaseEnd
Figure 7. MSI_PRO_with_b64.png BaseEnd

 

PNG-Embedded Payload Staging

Our analysis confirmed the PNG file contained a Base64-encoded .NET assembly appended to the image data. The extracted content was decoded and loaded directly into memory using the Reflection.Assembly::Load method, enabling execution without writing a payload to disk. This technique allows malicious code to bypass many traditional file-based detection mechanisms and complicates forensic recovery. The content of this is a malware loader, commonly referred to as PhantomVAI.

 

Payload URLs Passed to the Loader

Once loaded, the .NET assembly was provided with additional parameters that directed follow-on activity. Two notable URLs were passed into the loader at runtime:

QHe05ycvNWblJnbo9mavI3b0NWZ09mcw9ie5hnLl1GNzdXZu9yL6MHc0RHa -> hxxps://news4me[.]xyz/protector/johnremcos.txt

hxxps://news4me.xyz/uac.png

The first is an obfuscated string that is set to the variable “$hydrotherophyte” where it is later passed into the VAI method to be reversed and Base64 decoded where we see the “news4me[.]xyz/protector/johnremcos.txt” link. This text document also contains obfuscated text that is reversed and Base64 decoded to output a version of Remcos RAT.

The last URL shown in the script is also being passed into the VAI method and contains similar methods of embedding malicious code between “BaseStart” and “BaseEnd” markers. Once decoded, the embedded file is a UAC Bypass DLL used to facilitate privilege escalation.

 

Execution Flow Summary

Once the assembly was loaded, the script dynamically resolved a specific class and invoked a method (VAI) responsible for orchestrating subsequent execution steps including additional payloads and persistence through scheduled tasks. At this stage, execution control was fully transferred from the initial VBS and PowerShell components to the in-memory .NET loader, showing how it went from script-based delivery to modular payload execution.

This execution pattern shows a separation of responsibilities:

  • VBS file acts as an obfuscated launcher
  • PowerShell serves as a fileless delivery mechanism
  • Embedded .NET assembly provides a framework for executing additional payloads and persistence mechanisms.

This modular design enables attackers to reuse the same loader logic across multiple campaigns, while varying payloads and delivery vectors as needed.

 

Attacker Infrastructure and Open Directory Architecture

Analysis of the decoded loader behavior and embedded network artifacts led to further examination of the external infrastructure used to support payload delivery. This infrastructure was hosted on an attacker-controlled domain configured with openly accessible directories, enabling direct browsing and retrieval of hosted content. Notably the following:

news4me[.]xyz/coupon/

news4me[.]xyz/protector/

news4me[.]xyz/invoice/

Review of the exposed directories revealed a structured layout supporting multiple stages of infection, with /coupon/ and /protector/ being directly related to one another, and /invoice/ containing a separate attack chain altogether.

 

Exposed Directory Structure

The presence of multiple openly accessible directories indicates a deliberate infrastructure design rather than accidental exposure. Each directory served a distinct role in the overall infection workflow, allowing the attacker to stage delivery scripts, payloads, and alternate infection vectors from a single domain.

 

VBS-to-Payload Mapping (/coupon/ and /protector/)

Figure 7. coupon open directory
Figure 8. /coupon/ open directory

The /coupon/ directory contained numerous VBS files that were heavily obfuscated using Unicode characters as we previously mentioned. While the scripts differed in appearance, deobfuscation showed that they followed a consistent execution pattern, reconstructing and launching fileless PowerShell loaders similar to the one observed in the initial detection. The different VBS files each mapped to different types of malware stored in text files in the /protector/ directory.

Figure 8. protector open directory
Figure 9. /protector/ open directory

Further inspection of the associated payload directories revealed multiple configuration and staging files corresponding to different malware families. Each obfuscated VBS script appeared to map to a distinct payload hosted within the same infrastructure, indicating a modular delivery model in which the attacker could reuse the same loader framework while selectively deploying different malware depending on the campaign or target.

 

Alternate Attack Chain via /invoice/

Figure 9. invoice open directory
Figure 10. /invoice/ open directory

The /invoice/ directory hosted a separate attack chain with a malicious batch script and a ZIP folder containing a fake PDF internet shortcut file. This delivery path was independent of the VBS-based loaders but relied on the same attacker-controlled infrastructure.

The presence of multiple payloads hosted under a single domain suggests that this infrastructure was designed for scalability and reuse rather than for a single opportunistic intrusion. By maintaining openly accessible directories, the threat actor reduced operational complexity, while enabling rapid modification or expansion of available payloads without altering the initial delivery mechanism.

Examination of the open directories showed that the initial VBS detection was only one entry point into a much larger delivery system. The same infrastructure was being used to host multiple scripts and payloads, enabling different attack vectors without changing the underlying loader.

 

Secondary Infection Vector via Weaponized ‘PDF’

In addition to the VBS-based delivery mechanisms, further analysis of the attacker-controlled infrastructure revealed a secondary infection vector hosted under an /invoice/ directory. This vector relied on a weaponized “PDF” and showed an entry point separate from the original VBS execution chain.

 

Weaponized Document and Batch Script Delivery

Artifacts within this directory included a batch script (44rrr.bat) and a compressed archive masquerading as a PDF (Invoice-JL1852586778.pdf.zip) as shown previously. The ZIP file did not contain a legitimate document, but an Internet Shortcut file disguised as a PDF.

Figure 10. Contents of Invoice-JL1852586778
Figure 11. Contents of Invoice-JL1852586778.pdf.zip

Figure 11. Invoice-JL1852586778 properties showing a URL address
Figure 12. Invoice-JL1852586778.pdf.zip properties showing a URL address

undefined-Mar-23-2026-10-39-57-6519-PM
Figure 13. Full URL for Invoice-JL1852586778.pdf.zip

When executed, the shortcut redirected the system to attacker-controlled, Cloudflare domains such as the decoded URL from the properties section of the file “file://bacteria-spent-endless-grammar.trycloudflare[.]com@SSL/DavWWWRoot/okl” and initiated additional command execution and payload retrieval.

Dedicated to hunting and eradicating the world's most challenging threats.

SpiderLabs

 

Batch Script Execution and Network Activity

Figure 13. Contents of 44rrr-bat
Figure 14. Contents of 44rrr.bat

undefined-Mar-23-2026-10-39-57-4454-PM
Figure 15. Sample of 44rrr.bat once changed to UTF-16LE

The batch script was encoded in UTF-16LE, which aligns with typical Windows script handling rather than intentional obfuscation. Upon execution, it ran in a hidden context and established outbound connections to external URLs hosting additional ZIP, BAT, and TXT-based payloads.

undefined-Mar-23-2026-10-39-59-5735-PM
Figure 16. Additional sample of 44rrr.bat decoded with encoded URLs inside

Execution resulted in extensive follow-on activity, including the creation of numerous malicious files and the initiation of connections to remote network shares such as the following:

css-direct-excel-highlights.trycloudflare[.]com/1Nov20MA.zip

tammhdka[.]cloud:5790/PHNovSU.bat

 

Python Payload Deployment and MainRingtones Staging

Sandbox detonation of these files confirmed that this delivery chain facilitated the deployment of Python-based payloads in addition to script-based components. Multiple Python files were written to disk alongside batch scripts and compressed archives, with several staged within a directory named /Contacts/MainRingtones. While the directory name itself appears benign, its contents and observed behavior indicate it was used as a temporary working location for malicious scripts.

Behavioral telemetry associated with the Python components included indicators of memory injection, shellcode execution, and outbound network activity, consistent with loader-style Python frameworks used to support post-execution payload handling. VirusTotal detections further classified these artifacts as Python-based trojans under the Kramer malware family. Although full reverse engineering of each Python script was outside the scope of this investigation, the observed behaviors align with a modular post-compromise workflow.

 

Cloudflare Infrastructure and Payload Rotation

undefined-Mar-23-2026-10-39-59-0490-PM
Figure 17. Malicious Cloudflare open directory

Subsequent inspection of the different associated Cloudflare domains revealed openly accessible directories containing numerous text files that, when decoded, functioned as executable batch logic. Several of these files shared identical hashes while referencing different external resources, reinforcing a pattern of infrastructure reuse and payload rotation.

This mirrors the modular approach observed in the VBS-based delivery chain and supports the assessment that the attacker infrastructure was designed to enable multiple infection vectors using shared hosting and tooling.

 

Risk, Impact, and Key Takeaways

The activity observed in this investigation presents a moderate to high risk due to the flexibility and reuse of the attacker infrastructure rather than the impact of any single payload. While the initial VBS execution was successfully prevented, the broader campaign demonstrates multiple viable entry points capable of delivering different malware types using the same hosting and delivery framework.

The use of fileless loaders, obfuscated scripts, and payloads embedded within non-executable file formats significantly increases the likelihood of evasion against traditional signature-based defenses. By staging malicious content within PNG files, ZIP archives, and Internet Shortcut files, the attacker reduced reliance on direct executable downloads while maintaining the ability to rapidly modify or rotate payloads.

Open directory configurations played a central role in enabling this campaign. The exposed infrastructure allowed the attacker to host multiple scripts, configuration files, and payloads in parallel, supporting distinct infection vectors such as VBS-based loaders and weaponized document delivery. This approach lowers operational overhead for the threat actor while increasing the potential reach and longevity of the campaign.

The presence of Python-based tooling further amplifies risk, as it introduces an additional execution layer capable of handling post-compromise activity such as payload staging, memory injection, and follow-on command execution. Combined with batch scripting and PowerShell, this multi-language approach provides resilience against partial detection or containment.

Key takeaways from this investigation include:

  • A single detection can mask a much broader campaign when modular loaders and shared infrastructure are in use.
  • Open directories and cloud-backed hosting can enable rapid payload rotation and support multiple attack vectors from the same domain.
  • Non-traditional file formats and scripting languages continue to be effective delivery mechanisms for modern malware campaigns.
  • Early containment is critical, but deeper analysis is necessary to assess campaign scope and infrastructure reuse.

 

Defensive Considerations

Restricting execution of high-risk script types such as .vbs and .bat, particularly from user-writable directories, can help reduce initial access. Constraining PowerShell usage and monitoring in-memory execution techniques further limits attacker flexibility. At the network level, blocking or tightly controlling WebDAV traffic would disrupt Internet Shortcut–based delivery methods, while TLD-based filtering such as restricting “.xyz” domains where possible can reduce exposure to commonly abused infrastructure. Although endpoint protection successfully prevented execution in this case, layered controls remain critical to disrupting multi-vector malware campaigns.

Based on the findings from this investigation, the team implemented custom detections to identify related VBS loaders, PNG-embedded payload staging, and associated infrastructure, improving coverage for similar activity across the environment.

Overall, this activity underscores the importance of investigating beyond the initial alert to identify supporting infrastructure and alternate delivery paths. While endpoint protections successfully mitigated the immediate threat, the findings indicate a reusable malware framework capable of adapting delivery techniques and payloads with minimal changes to its underlying architecture.

 

Indicators of Compromise

File/Domain/IP/URL

SHA1 Hash Value/Description

Notes

news4me[.]xyz

Malicious domain

Attacker-controlled domain hosting multiple open directories used for malware delivery and staging

news4me[.]xyz/coupon/

Open directory

Directory hosting multiple Unicode-obfuscated VBS loader scripts

300ff.vbs/51379754466.vbs

274ed28bd083feb5600297a1728a4063d6b415ad

Unicode-obfuscated script containing lines to pull down additional malware (UAC Bypass, PhantomVAI Loader, one of various malware in /protector/ directory

700ff.vbs

905578853c8880da35d97e599cb0168cf3bf74f8

coupon.vbs

1e0ab184a8941ab4d5e3552237061019a06b3cca

news4me[.]xyz/uac.png

Malicious URL

PNG file hosting embedded UAC bypass DLL using BaseStart / BaseEnd markers

uac.png

c214e2cde87d614daceb2cdcbf4ff88fa24a1d43

PNG file containing appended UAC bypass DLL

UAC.dll

a55d61fb7fe814afeab4f4d7f42be4cf60609414

Malicious DLL used for UAC bypass and privilege escalation

ia601409.us.archive[.]org/25/items/msi-pro-with-b-64_20251106/MSI_PRO_with_b64.png

Malicious URLs

Internet Archive–hosted PNG containing PhantomVAI loader embedded within image data

ia801409.us.archive[.]org/10/items/msi-pro-with-b-64_20251111/MSI_PRO_with_b64.png

ia600407.us.archive[.]org/7/items/msi-pro-with-b-64_202511/MSI_PRO_with_b64.png

ia600606.us.archive[.]org/11/items/msi-pro-with-b-64_20251030/MSI_PRO_with_b64.png

MSI_PRO_withb64.png

a4a3d9ac1df13736a29a615fc86b5f3835aba11d

PNG file containing Base64-encoded PhantomVAI .NET loader appended to image

Microsoft.Win32.TaskScheduler.dll

77429c27de47d09ac51bc4c5f44329fe823ad01c

PhantomVAI Loader

news4me[.]xyz/protector/

Open directory

Directory hosting multiple text-based payloads corresponding to different malware families

davidxworm.txt

0fa5b16ed45922637cdaadca8082e329b8775732

Text files stored in /protector/ directory that contain malware when reversed and base64 decoded

johnny.txt

d2888b491eb772daf92575245f352146b9d9d8f2

johnny2.txt

3aef7e2d1baa433579b644a81fc080c541f3e7d2

johnny3.txt

84fdff23b056633b43cc7375d792c4c100a606ec

johnscorpio.txt

e05701bf93c9032b5714774507c3b026a51f4fea

johnxworm.txt

d450e39c688b5ad83666ab770c44c6feb2374a76

johnxworm3.1.txt

0fa5b16ed45922637cdaadca8082e329b8775732

manadanaxworm.txt

2d7114685313f9a6045ccb19c2a4d194398d567b

Freededenxworm.txt

de7e91b62651355d43da56ed468dd6e92118192c

munibxworm.txt

4e23a77ec70a27941be891433cff5b56d290d8b1

VortexMalwareClipperStubStartupapihost.txt

a5513a9367daf2dbb780d17f2a9302686c7ad3d5

johnremcos.txt

ffe9a4a3daaa5773e324014d0282d4c6bbbc1da2

No-directly-named malware extracted from text files

69fe62c8af8eefddf48eef454929c4fae7f2f2a6

Xworm Variant from davidxworm.txt once decoded

f8f63c1c20bacc97925a9c86c6e4b887cdd11631

Unknown malware from johnny.txt once decoded

ff3512c52e34b7fad458d632f347a37f32a671fd

Unknown malware from johnny2.txt once decoded

c871213fd20404fb5b48a1e4d4b256f3bffbfcd9

Unknown malware from johnny3.txt once decoded

eaedebdc23056fa4964a75d35bf20f9dd179a582

ScorpioRAT malware from johnscorpio.txt once decoded

961c4c69cfaca6f085a67cd5ee3a4b7b5dc4422f

Xworm Variant from johnxworm.txt once decoded

40634fc36fbe0d2903a9ac319ff7fd22ce4a7ace

Xworm Variant from johnxworm3.1.txt once decoded

5f57b08104cd8961a231f514d3ffaad3f873e3d6

Xworm Variant from manadanaxworm.txt once decoded

51b25f39a4367484c673a2bce38efd95de1cbbd5

Xworm Variant from freededenxworm.txt once decoded

1e832ae194be28692c669b9a3f5a5255d3022b5b

Xworm Variant from munibxworm.txt once decoded

86746d0ad3acfa0e90b7691ccf675dd57af40013

Malware from VortexMalwareClipperStubStartupapihost.txt once decoded

news4me[.]xyz/invoice/

Open Directory

Hosting malicious BAT file and fake PDF in ZIP

44rrr.bat

314b42be5ce942dd1c3d0bddb0cc6e0cdcb1acad

Obfuscated bat that pulls down malicious ZIPs

css-direct-excel-highlights.trycloudflare[.]com/1Nov20MA.zip

Malicious URLs

URL hosting ZIP full of malicious python/bat/txt files.

tammhdka[.]cloud:5790/PH1NovMA.zip

css-direct-excel-highlights.trycloudflare[.]com/1Nov20ST.zip

tammhdka[.]cloud:5790/PH1NovST.zip

css-direct-excel-highlights.trycloudflare[.]com/1Nov20SU.bat

Malicious URLs

Hosting malicious files to continue attack chain in fake PDF finding

tammhdka[.]cloud:5790/PHNovSU.bat

Invoice-JL1852586778.pdf.zip

98CDFB464D8A98E07479909DD1DB04EEC849E94E

ZIP archive containing an Internet Shortcut file masquerading as a PDF

bacteria-spent-endless-grammar.trycloudflare[.]com

Malicious URLs

Cloudflare-backed domain hosting payloads referenced by fake PDF shortcut

bacteria-spent-endless-grammar.trycloudflare[.]com/okl

Directory used for payload retrieval during fake PDF execution

bacteria-spent-endless-

grammar.trycloudflare[.]com@SSL\DavWWWRoot\okl\Scan704370326.wsh

WebDAV-hosted script retrieved via Internet Shortcut execution

aye-knights-copyrights-nominations.trycloudflare[.]com\DavWWWRoot\ta\ukd22.wsf

WebDAV-hosted Windows Script File used in secondary-stage execution

adapter-chess-gently-residential.trycloudflare[.]com@SSL\DavWWWRoot\UKCC1.txt

TXT file functioning as executable batch logic

shirts-june-gratis-repository.trycloudflare[.]com/1Nov20MA.zip

ZIP archive hosting secondary-stage payload

1Nov20MA.zip

0e4dbc00d72f228afe9ee58499f70f3f9bbfcebe

ZIP payload retrieved by BAT script

tammhdka[.]pro:5590/1NovMA.zip

Malicious URL

Alternate hosting location for 1NovMA.zip

1NovMA.zip

810afcebb23642b681d151a81fdcca3fcc43f96a

Secondary-stage ZIP payload

shirts-june-gratis-repository.trycloudflare[.]com/1Nov20ST.zip

Malicious URL

ZIP payload associated with alternate execution branch

1Nov20ST.zip

c76ca312e44a02a9713062eb90410c3008819727

Secondary-stage ZIP payload

tammhdka[.]pro:5590/1NovST.zip

Malicious URL

Alternate hosting location for 1NovST.zip

1NovST.zip

1966478c5568ef90ffc1d55ce09192e1a9e774c5

Secondary-stage ZIP payload

shirts-june-gratis-repository.trycloudflare[.]com/1Nov20SU.txt

Malicious URL

TXT payload used as executable batch logic

1Nov20SU.txt/ SMQRW.bat

bfc6dbb94f02f7a61145f86e550015f75d5829b6

Text-based script decoded and executed as BAT logic

tammhdka[.]pro:5590/1NovSU.txt

Malicious URL

Alternate hosting location for TXT payload

1NovSU.txt

1fb396bbf73735b90e521eb5534c97d5cc049d99

TXT-based executable logic

1UK-Vioooo.py

08E3321955194964BD1E3784691E2D62055F6860

Python payload dropped during execution

1aaaaannnov24.py

63A7CC185C023C2E52519DF9AA530FB2C35A2D8F

Python payload dropped during execution

1aaaassssssnov24.py

CA00BB814BB7AB92C738DC10362A06B7AAF9247E

Python payload dropped during execution

1hvvvnov24.py

A97F124854C8DDD7B52A7669A51C22B7A021EE78

Python payload dropped during execution

1xwmmnov24.py

E52683B9C41E8DE19FD6C213ED0C960EC1B6C5B1

Python payload dropped during execution

UKCC1.bat

F66364A3566D48E0588237E288003C541AE0FD73

Batch script used in secondary-stage execution

64RUZPQ.zip

C72921D080EA0273F54B8CF2F7EF1241CCA16D71

Compressed payload dropped during execution

RUZPQ.zip

9B90E2C49B52620531A75D4F23DD48DA25670E03

Compressed payload associated with Python execution

UKAA2.txt/ UKBB2.txt/ UKCC2.txt/ UKFF2.txt

e8a5dbeb166ca201b24a9d68b6d5cd0f10744491

Contains commands to reach out to malicious domains/pull down files

UKAA1.txt/ UKBB1.txt/ UKCC1.txt/ UKFF1.txt

a27315ce27675e953aec70a7639e2ea3f77b7159

UKDD1.txt/ UKEE1.txt

48f9d6a325afd0daa9cbd6e05a65c0b46fa8f536

UKDD2.txt/ UKEE2.txt

9c0e9d1bde0aa69374b4c7301fb53d0e47ab7ade

ABOUT LEVELBLUE

LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo