VBS Downloader and Defender Control
VBS Downloader and Defender Control
AI Analysis
Technical Summary
The 'VBS Downloader and Defender Control' malware is a malicious threat primarily characterized by its use of Visual Basic Script (VBS) to download additional payloads and manipulate Windows Defender settings. This malware operates through batch scripts that execute VBS code to facilitate payload delivery and potentially disable or control Windows Defender, the built-in antivirus and anti-malware solution on Windows systems. The malware's core functionality involves network activity to fetch external malicious components, enabling further compromise or persistence on the infected system. Although specific affected versions or products are not detailed, the malware targets Windows environments where scripting and Defender controls are accessible. The malware is categorized under network activity, payload delivery, and external analysis, indicating its role in initial infection stages and evasion of security mechanisms. Despite being labeled with a low severity by the source, the malware's ability to disable or control Defender could significantly increase the risk of subsequent infections or unauthorized activities. No known exploits in the wild have been reported, suggesting limited or targeted use. A patch or mitigation guidance is available via Wilbur Security, emphasizing the importance of applying recommended security measures to prevent exploitation. The technical details indicate a moderate threat level (3) and analysis score (2), reflecting a relatively low but non-negligible risk. The malware's reliance on scripting and Defender manipulation makes it a concern primarily for Windows-based systems that do not have strict script execution policies or updated security configurations.
Potential Impact
For European organizations, the primary impact of this malware lies in its potential to bypass or disable Windows Defender, thereby exposing systems to further malware infections or unauthorized access. Organizations relying heavily on Windows Defender as a frontline defense may face increased risk of undetected malicious activities. The malware's downloader capability can introduce additional payloads, potentially leading to data breaches, ransomware infections, or lateral movement within networks. The impact on confidentiality, integrity, and availability depends on the secondary payloads delivered post-infection. Given the malware's low severity rating and absence of widespread exploitation, the immediate risk is limited; however, failure to address this threat could lead to escalated compromises. European organizations with less mature endpoint protection strategies or those that permit script execution without restrictions are more vulnerable. Additionally, sectors with high-value data or critical infrastructure could experience operational disruptions or data loss if the malware facilitates more severe attacks. The malware's network activity may also generate anomalous traffic, potentially triggering security alerts or impacting network performance if not properly managed.
Mitigation Recommendations
1. Enforce strict Group Policy settings to restrict or disable the execution of VBS and batch scripts, especially from untrusted sources or locations. 2. Ensure Windows Defender and all endpoint protection solutions are fully updated and configured to prevent tampering or disabling by unauthorized processes. 3. Apply the patch and security recommendations provided by Wilbur Security to address specific vulnerabilities exploited by this malware. 4. Implement application whitelisting to allow only approved scripts and executables to run, reducing the risk of malicious script execution. 5. Monitor network traffic for unusual outbound connections indicative of downloader activity, using intrusion detection systems or endpoint detection and response (EDR) tools. 6. Conduct regular user awareness training to prevent execution of suspicious scripts or files received via email or other vectors. 7. Employ multi-layered security controls, including behavioral analysis and anomaly detection, to identify and block malware that attempts to disable security tools. 8. Regularly audit and review Defender and other security tool configurations to ensure they have not been altered or disabled.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
Indicators of Compromise
- url: http://185.81.114.49/setup.exe
- hash: 9ed6a2c887466c353cefde8475095bde936db385e337f085f62ed3cd470d21ec
- hash: e06b32189ebe718e749ca1c13b708dc315bd80b4
- hash: 2ed20c74e46b75a2e151de7682235de4
- file: %TEMP%\nsrCAAE.tmp\nsExec.dll
- hash: 288100583f65a2b7acfc0c7e231c0e268c58d3067675543f627c01e82f6fd884
- hash: 4751809ef6fd3ced738392e7c5df6d4e3938d85711daa0b52b045b5092913c27
- file: %WINDIR%\libeay32.dll
- hash: e886954dda4cecdf16fdf8c45d5062692c2051dac2b0f4a8e288480ff9b99b61
- file: %WINDIR%\ssleay32.dll
- hash: c4dbed05760a52833d8d714686ee48efbec44b182d354a9ae8942768a9a19cd2
- file: %WINDIR%\Tor\libcrypto-1_1.dll
- hash: bb2958b2fb3b99f86137ba9bd0122f1dfbc25b77dc8381e8072babb2945c64eb
- file: %WINDIR%\Tor\libevent-2-1-6.dll
- hash: fde69dcbccb36d4a269a61e45978cff6b9462bb7af15808ce4ccce59f0a566b6
- file: %WINDIR%\Tor\libevent_core-2-1-6.dll
- hash: 1ad61b7364a6bfc55d4dd2f1309c7ff8818c22b91407439d768d0d84090a9bbf
- file: %WINDIR%\Tor\libevent_extra-2-1-6.dll
- hash: b076ba10a04f86f3d0d8ee587ca30addad3f2de1d99dd40dc2c2fec81d051787
- file: %WINDIR%\Tor\libgcc_s_sjlj-1.dll
- hash: 08103ded79a6069be980c9ce74ed04e2f628964b128c6be3c0571dd061b89327
- file: %WINDIR%\Tor\libssp-0.dll
- hash: 92d7137e37285ec2eb07471930a7a5bf5aad1f8dccfebd9696570bcb29daf367
- file: %WINDIR%\Tor\libssl-1_1.dll
- hash: 178fc58b34094c32bf7fb903ea9d40d217a78c09feaed836a78ad570381c37a3
- file: %WINDIR%\Tor\libwinpthread-1.dll
- hash: a8749afa1916fbb0f579f5b68fafaca629f5930a30ea974d5136b62c3ea232ab
- file: %WINDIR%\Tor\tor-gencert.exe
- hash: cf8582a4cf26125c4966e5739539a49a02634acaa3bb5bdbf5c0484d2b76d103
- file: %WINDIR%\Tor\tor.exe
- hash: 010d814276e6c43dca396c156567a2f513992f6fdb9a030f552c399bcd2b1bbb
- file: %WINDIR%\Tor\zlib1.dll
- hash: bca3a76c9e4d7b2c936d3ff78b7aa40cf51771dda828bed91d66d77073d6c0d0
- file: %WINDIR%\systemsv.exe
- hash: 97564e945e1ec5a9b401fe69f4bd99663a9bf84ad6f5804d683d0890803975dc
- ip: 185.81.114.49
- ip: 212.129.62.232
- ip: 130.89.149.57
- ip: 185.96.88.29
- ip: 217.160.141.52
- ip: 204.13.164.118
- ip: 62.210.83.207
- ip: 195.123.245.141
- ip: 200.219.222.205
- link: https://www.wilbursecurity.com/2020/01/vbs-downloader-and-defender-control/
- malware-sample: getp.bat|e376de5663f6da59adc4926f227277d8
- file: getp.bat
- hash: e376de5663f6da59adc4926f227277d8
- hash: 157e73777849587b33d789ec7880bd1497a6a1d0
- hash: c85525ca92a4a0c02992fcab123323eed59876638bccad3949952a02c8271282
- size-in-bytes: 3028
- malware-sample: DefenderControl.exe|3a24a7b7c1ba74a5afa50f88ba81d550
- file: DefenderControl.exe
- hash: 3a24a7b7c1ba74a5afa50f88ba81d550
- hash: 5da4de1dbba55774891497297396fd2e5c306cf5
- hash: a201f7f81277e28c0bdd680427b979aee70e42e8a98c67f11e7c83d02f8fe7ae
- size-in-bytes: 846008
- malware-sample: setup.exe|2ed20c74e46b75a2e151de7682235de4
- file: setup.exe
- hash: 2ed20c74e46b75a2e151de7682235de4
- hash: e06b32189ebe718e749ca1c13b708dc315bd80b4
- hash: 9ed6a2c887466c353cefde8475095bde936db385e337f085f62ed3cd470d21ec
- size-in-bytes: 9302555
VBS Downloader and Defender Control
Description
VBS Downloader and Defender Control
AI-Powered Analysis
Technical Analysis
The 'VBS Downloader and Defender Control' malware is a malicious threat primarily characterized by its use of Visual Basic Script (VBS) to download additional payloads and manipulate Windows Defender settings. This malware operates through batch scripts that execute VBS code to facilitate payload delivery and potentially disable or control Windows Defender, the built-in antivirus and anti-malware solution on Windows systems. The malware's core functionality involves network activity to fetch external malicious components, enabling further compromise or persistence on the infected system. Although specific affected versions or products are not detailed, the malware targets Windows environments where scripting and Defender controls are accessible. The malware is categorized under network activity, payload delivery, and external analysis, indicating its role in initial infection stages and evasion of security mechanisms. Despite being labeled with a low severity by the source, the malware's ability to disable or control Defender could significantly increase the risk of subsequent infections or unauthorized activities. No known exploits in the wild have been reported, suggesting limited or targeted use. A patch or mitigation guidance is available via Wilbur Security, emphasizing the importance of applying recommended security measures to prevent exploitation. The technical details indicate a moderate threat level (3) and analysis score (2), reflecting a relatively low but non-negligible risk. The malware's reliance on scripting and Defender manipulation makes it a concern primarily for Windows-based systems that do not have strict script execution policies or updated security configurations.
Potential Impact
For European organizations, the primary impact of this malware lies in its potential to bypass or disable Windows Defender, thereby exposing systems to further malware infections or unauthorized access. Organizations relying heavily on Windows Defender as a frontline defense may face increased risk of undetected malicious activities. The malware's downloader capability can introduce additional payloads, potentially leading to data breaches, ransomware infections, or lateral movement within networks. The impact on confidentiality, integrity, and availability depends on the secondary payloads delivered post-infection. Given the malware's low severity rating and absence of widespread exploitation, the immediate risk is limited; however, failure to address this threat could lead to escalated compromises. European organizations with less mature endpoint protection strategies or those that permit script execution without restrictions are more vulnerable. Additionally, sectors with high-value data or critical infrastructure could experience operational disruptions or data loss if the malware facilitates more severe attacks. The malware's network activity may also generate anomalous traffic, potentially triggering security alerts or impacting network performance if not properly managed.
Mitigation Recommendations
1. Enforce strict Group Policy settings to restrict or disable the execution of VBS and batch scripts, especially from untrusted sources or locations. 2. Ensure Windows Defender and all endpoint protection solutions are fully updated and configured to prevent tampering or disabling by unauthorized processes. 3. Apply the patch and security recommendations provided by Wilbur Security to address specific vulnerabilities exploited by this malware. 4. Implement application whitelisting to allow only approved scripts and executables to run, reducing the risk of malicious script execution. 5. Monitor network traffic for unusual outbound connections indicative of downloader activity, using intrusion detection systems or endpoint detection and response (EDR) tools. 6. Conduct regular user awareness training to prevent execution of suspicious scripts or files received via email or other vectors. 7. Employ multi-layered security controls, including behavioral analysis and anomaly detection, to identify and block malware that attempts to disable security tools. 8. Regularly audit and review Defender and other security tool configurations to ensure they have not been altered or disabled.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 3
- Analysis
- 2
- Uuid
- 5e33608b-9604-494a-b9b7-4fa6950d210f
- Original Timestamp
- 1580455113
Patch Information
Indicators of Compromise
Url
Value | Description | Copy |
---|---|---|
urlhttp://185.81.114.49/setup.exe | — |
Hash
Value | Description | Copy |
---|---|---|
hash9ed6a2c887466c353cefde8475095bde936db385e337f085f62ed3cd470d21ec | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
hashe06b32189ebe718e749ca1c13b708dc315bd80b4 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
hash2ed20c74e46b75a2e151de7682235de4 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
hash288100583f65a2b7acfc0c7e231c0e268c58d3067675543f627c01e82f6fd884 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
hash4751809ef6fd3ced738392e7c5df6d4e3938d85711daa0b52b045b5092913c27 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
hashe886954dda4cecdf16fdf8c45d5062692c2051dac2b0f4a8e288480ff9b99b61 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
hashc4dbed05760a52833d8d714686ee48efbec44b182d354a9ae8942768a9a19cd2 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
hashbb2958b2fb3b99f86137ba9bd0122f1dfbc25b77dc8381e8072babb2945c64eb | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
hashfde69dcbccb36d4a269a61e45978cff6b9462bb7af15808ce4ccce59f0a566b6 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
hash1ad61b7364a6bfc55d4dd2f1309c7ff8818c22b91407439d768d0d84090a9bbf | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
hashb076ba10a04f86f3d0d8ee587ca30addad3f2de1d99dd40dc2c2fec81d051787 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
hash08103ded79a6069be980c9ce74ed04e2f628964b128c6be3c0571dd061b89327 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
hash92d7137e37285ec2eb07471930a7a5bf5aad1f8dccfebd9696570bcb29daf367 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
hash178fc58b34094c32bf7fb903ea9d40d217a78c09feaed836a78ad570381c37a3 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
hasha8749afa1916fbb0f579f5b68fafaca629f5930a30ea974d5136b62c3ea232ab | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
hashcf8582a4cf26125c4966e5739539a49a02634acaa3bb5bdbf5c0484d2b76d103 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
hash010d814276e6c43dca396c156567a2f513992f6fdb9a030f552c399bcd2b1bbb | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
hashbca3a76c9e4d7b2c936d3ff78b7aa40cf51771dda828bed91d66d77073d6c0d0 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
hash97564e945e1ec5a9b401fe69f4bd99663a9bf84ad6f5804d683d0890803975dc | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
hashe376de5663f6da59adc4926f227277d8 | — | |
hash157e73777849587b33d789ec7880bd1497a6a1d0 | — | |
hashc85525ca92a4a0c02992fcab123323eed59876638bccad3949952a02c8271282 | — | |
hash3a24a7b7c1ba74a5afa50f88ba81d550 | — | |
hash5da4de1dbba55774891497297396fd2e5c306cf5 | — | |
hasha201f7f81277e28c0bdd680427b979aee70e42e8a98c67f11e7c83d02f8fe7ae | — | |
hash2ed20c74e46b75a2e151de7682235de4 | — | |
hashe06b32189ebe718e749ca1c13b708dc315bd80b4 | — | |
hash9ed6a2c887466c353cefde8475095bde936db385e337f085f62ed3cd470d21ec | — |
File
Value | Description | Copy |
---|---|---|
file%TEMP%\nsrCAAE.tmp\nsExec.dll | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
file%WINDIR%\libeay32.dll | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
file%WINDIR%\ssleay32.dll | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
file%WINDIR%\Tor\libcrypto-1_1.dll | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
file%WINDIR%\Tor\libevent-2-1-6.dll | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
file%WINDIR%\Tor\libevent_core-2-1-6.dll | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
file%WINDIR%\Tor\libevent_extra-2-1-6.dll | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
file%WINDIR%\Tor\libgcc_s_sjlj-1.dll | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
file%WINDIR%\Tor\libssp-0.dll | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
file%WINDIR%\Tor\libssl-1_1.dll | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
file%WINDIR%\Tor\libwinpthread-1.dll | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
file%WINDIR%\Tor\tor-gencert.exe | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
file%WINDIR%\Tor\tor.exe | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
file%WINDIR%\Tor\zlib1.dll | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
file%WINDIR%\systemsv.exe | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
filegetp.bat | — | |
fileDefenderControl.exe | — | |
filesetup.exe | — |
Ip
Value | Description | Copy |
---|---|---|
ip185.81.114.49 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
ip212.129.62.232 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
ip130.89.149.57 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
ip185.96.88.29 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
ip217.160.141.52 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
ip204.13.164.118 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
ip62.210.83.207 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
ip195.123.245.141 | https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/ | |
ip200.219.222.205 | RDP Login |
Link
Value | Description | Copy |
---|---|---|
linkhttps://www.wilbursecurity.com/2020/01/vbs-downloader-and-defender-control/ | — |
Malware sample
Value | Description | Copy |
---|---|---|
malware-samplegetp.bat|e376de5663f6da59adc4926f227277d8 | — | |
malware-sampleDefenderControl.exe|3a24a7b7c1ba74a5afa50f88ba81d550 | — | |
malware-samplesetup.exe|2ed20c74e46b75a2e151de7682235de4 | — |
Size in-bytes
Value | Description | Copy |
---|---|---|
size-in-bytes3028 | — | |
size-in-bytes846008 | — | |
size-in-bytes9302555 | — |
Threat ID: 682c7af9e3e6de8ceb77d8b9
Added to database: 5/20/2025, 12:52:09 PM
Last enriched: 6/19/2025, 2:35:07 PM
Last updated: 9/27/2025, 10:45:14 PM
Views: 17
Related Threats
Actions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.