General
-
Target
d.vbs
-
Size
816KB
-
Sample
220819-vwbqfsgcdj
-
MD5
2af5abb6db76b3f1872d568880aced94
-
SHA1
1e47fb1ba30452f72db8f71fe8dde5a7ad5c1f2c
-
SHA256
3da90ba538cd2589d4018e15b760db3c508d6ffbb7032e3a66789a4c9d09c7b2
-
SHA512
ba2e899b365b637547301e2402f16f686badb3f182456dc9c552d1e25eb5a6ca6fa9d75cfe9e260f6ba0edba608daf7dee516cc58c659b8b4844388b330889d2
-
SSDEEP
6144:nfBfcfYfBfcfhfKfzfffBfcfYfBfcfhfKfqfBfcfYfBfcfhfKfdfBfcfYfBfcfht:r
Static task
static1
Behavioral task
behavioral1
Sample
d.vbs
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d.vbs
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: ftp- Host:
185.27.133.14 - Port:
21 - Username:
[email protected] - Password:
Rfg250583
Extracted
arrowrat
Fsocity
104.41.172.235:9091
YzpcKpvwT.exe
Targets
-
-
Target
d.vbs
-
Size
816KB
-
MD5
2af5abb6db76b3f1872d568880aced94
-
SHA1
1e47fb1ba30452f72db8f71fe8dde5a7ad5c1f2c
-
SHA256
3da90ba538cd2589d4018e15b760db3c508d6ffbb7032e3a66789a4c9d09c7b2
-
SHA512
ba2e899b365b637547301e2402f16f686badb3f182456dc9c552d1e25eb5a6ca6fa9d75cfe9e260f6ba0edba608daf7dee516cc58c659b8b4844388b330889d2
-
SSDEEP
6144:nfBfcfYfBfcfhfKfzfffBfcfYfBfcfhfKfqfBfcfYfBfcfhfKfdfBfcfYfBfcfht:r
Score10/10-
Blocklisted process makes network request
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-