Skip to main content

VBS Downloader and Defender Control

Low
Published: Thu Jan 30 2020 (01/30/2020, 00:00:00 UTC)
Source: CIRCL
Vendor/Project: tlp
Product: white

Description

VBS Downloader and Defender Control

AI-Powered Analysis

AILast updated: 06/19/2025, 14:35:07 UTC

Technical Analysis

The 'VBS Downloader and Defender Control' malware is a malicious threat primarily characterized by its use of Visual Basic Script (VBS) to download additional payloads and manipulate Windows Defender settings. This malware operates through batch scripts that execute VBS code to facilitate payload delivery and potentially disable or control Windows Defender, the built-in antivirus and anti-malware solution on Windows systems. The malware's core functionality involves network activity to fetch external malicious components, enabling further compromise or persistence on the infected system. Although specific affected versions or products are not detailed, the malware targets Windows environments where scripting and Defender controls are accessible. The malware is categorized under network activity, payload delivery, and external analysis, indicating its role in initial infection stages and evasion of security mechanisms. Despite being labeled with a low severity by the source, the malware's ability to disable or control Defender could significantly increase the risk of subsequent infections or unauthorized activities. No known exploits in the wild have been reported, suggesting limited or targeted use. A patch or mitigation guidance is available via Wilbur Security, emphasizing the importance of applying recommended security measures to prevent exploitation. The technical details indicate a moderate threat level (3) and analysis score (2), reflecting a relatively low but non-negligible risk. The malware's reliance on scripting and Defender manipulation makes it a concern primarily for Windows-based systems that do not have strict script execution policies or updated security configurations.

Potential Impact

For European organizations, the primary impact of this malware lies in its potential to bypass or disable Windows Defender, thereby exposing systems to further malware infections or unauthorized access. Organizations relying heavily on Windows Defender as a frontline defense may face increased risk of undetected malicious activities. The malware's downloader capability can introduce additional payloads, potentially leading to data breaches, ransomware infections, or lateral movement within networks. The impact on confidentiality, integrity, and availability depends on the secondary payloads delivered post-infection. Given the malware's low severity rating and absence of widespread exploitation, the immediate risk is limited; however, failure to address this threat could lead to escalated compromises. European organizations with less mature endpoint protection strategies or those that permit script execution without restrictions are more vulnerable. Additionally, sectors with high-value data or critical infrastructure could experience operational disruptions or data loss if the malware facilitates more severe attacks. The malware's network activity may also generate anomalous traffic, potentially triggering security alerts or impacting network performance if not properly managed.

Mitigation Recommendations

1. Enforce strict Group Policy settings to restrict or disable the execution of VBS and batch scripts, especially from untrusted sources or locations. 2. Ensure Windows Defender and all endpoint protection solutions are fully updated and configured to prevent tampering or disabling by unauthorized processes. 3. Apply the patch and security recommendations provided by Wilbur Security to address specific vulnerabilities exploited by this malware. 4. Implement application whitelisting to allow only approved scripts and executables to run, reducing the risk of malicious script execution. 5. Monitor network traffic for unusual outbound connections indicative of downloader activity, using intrusion detection systems or endpoint detection and response (EDR) tools. 6. Conduct regular user awareness training to prevent execution of suspicious scripts or files received via email or other vectors. 7. Employ multi-layered security controls, including behavioral analysis and anomaly detection, to identify and block malware that attempts to disable security tools. 8. Regularly audit and review Defender and other security tool configurations to ensure they have not been altered or disabled.

Need more detailed analysis?Get Pro

Technical Details

Threat Level
3
Analysis
2
Uuid
5e33608b-9604-494a-b9b7-4fa6950d210f
Original Timestamp
1580455113

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttp://185.81.114.49/setup.exe

Hash

ValueDescriptionCopy
hash9ed6a2c887466c353cefde8475095bde936db385e337f085f62ed3cd470d21ec
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
hashe06b32189ebe718e749ca1c13b708dc315bd80b4
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
hash2ed20c74e46b75a2e151de7682235de4
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
hash288100583f65a2b7acfc0c7e231c0e268c58d3067675543f627c01e82f6fd884
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
hash4751809ef6fd3ced738392e7c5df6d4e3938d85711daa0b52b045b5092913c27
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
hashe886954dda4cecdf16fdf8c45d5062692c2051dac2b0f4a8e288480ff9b99b61
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
hashc4dbed05760a52833d8d714686ee48efbec44b182d354a9ae8942768a9a19cd2
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
hashbb2958b2fb3b99f86137ba9bd0122f1dfbc25b77dc8381e8072babb2945c64eb
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
hashfde69dcbccb36d4a269a61e45978cff6b9462bb7af15808ce4ccce59f0a566b6
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
hash1ad61b7364a6bfc55d4dd2f1309c7ff8818c22b91407439d768d0d84090a9bbf
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
hashb076ba10a04f86f3d0d8ee587ca30addad3f2de1d99dd40dc2c2fec81d051787
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
hash08103ded79a6069be980c9ce74ed04e2f628964b128c6be3c0571dd061b89327
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
hash92d7137e37285ec2eb07471930a7a5bf5aad1f8dccfebd9696570bcb29daf367
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
hash178fc58b34094c32bf7fb903ea9d40d217a78c09feaed836a78ad570381c37a3
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
hasha8749afa1916fbb0f579f5b68fafaca629f5930a30ea974d5136b62c3ea232ab
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
hashcf8582a4cf26125c4966e5739539a49a02634acaa3bb5bdbf5c0484d2b76d103
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
hash010d814276e6c43dca396c156567a2f513992f6fdb9a030f552c399bcd2b1bbb
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
hashbca3a76c9e4d7b2c936d3ff78b7aa40cf51771dda828bed91d66d77073d6c0d0
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
hash97564e945e1ec5a9b401fe69f4bd99663a9bf84ad6f5804d683d0890803975dc
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
hashe376de5663f6da59adc4926f227277d8
hash157e73777849587b33d789ec7880bd1497a6a1d0
hashc85525ca92a4a0c02992fcab123323eed59876638bccad3949952a02c8271282
hash3a24a7b7c1ba74a5afa50f88ba81d550
hash5da4de1dbba55774891497297396fd2e5c306cf5
hasha201f7f81277e28c0bdd680427b979aee70e42e8a98c67f11e7c83d02f8fe7ae
hash2ed20c74e46b75a2e151de7682235de4
hashe06b32189ebe718e749ca1c13b708dc315bd80b4
hash9ed6a2c887466c353cefde8475095bde936db385e337f085f62ed3cd470d21ec

File

ValueDescriptionCopy
file%TEMP%\nsrCAAE.tmp\nsExec.dll
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
file%WINDIR%\libeay32.dll
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
file%WINDIR%\ssleay32.dll
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
file%WINDIR%\Tor\libcrypto-1_1.dll
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
file%WINDIR%\Tor\libevent-2-1-6.dll
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
file%WINDIR%\Tor\libevent_core-2-1-6.dll
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
file%WINDIR%\Tor\libevent_extra-2-1-6.dll
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
file%WINDIR%\Tor\libgcc_s_sjlj-1.dll
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
file%WINDIR%\Tor\libssp-0.dll
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
file%WINDIR%\Tor\libssl-1_1.dll
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
file%WINDIR%\Tor\libwinpthread-1.dll
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
file%WINDIR%\Tor\tor-gencert.exe
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
file%WINDIR%\Tor\tor.exe
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
file%WINDIR%\Tor\zlib1.dll
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
file%WINDIR%\systemsv.exe
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
filegetp.bat
fileDefenderControl.exe
filesetup.exe

Ip

ValueDescriptionCopy
ip185.81.114.49
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
ip212.129.62.232
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
ip130.89.149.57
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
ip185.96.88.29
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
ip217.160.141.52
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
ip204.13.164.118
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
ip62.210.83.207
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
ip195.123.245.141
https://app.any.run/tasks/5d55b048-87d5-4466-ae7f-631a2598f7a2/
ip200.219.222.205
RDP Login

Link

ValueDescriptionCopy
linkhttps://www.wilbursecurity.com/2020/01/vbs-downloader-and-defender-control/

Malware sample

ValueDescriptionCopy
malware-samplegetp.bat|e376de5663f6da59adc4926f227277d8
malware-sampleDefenderControl.exe|3a24a7b7c1ba74a5afa50f88ba81d550
malware-samplesetup.exe|2ed20c74e46b75a2e151de7682235de4

Size in-bytes

ValueDescriptionCopy
size-in-bytes3028
size-in-bytes846008
size-in-bytes9302555

Threat ID: 682c7af9e3e6de8ceb77d8b9

Added to database: 5/20/2025, 12:52:09 PM

Last enriched: 6/19/2025, 2:35:07 PM

Last updated: 9/27/2025, 10:45:14 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats