General

  • Target

    92bbfd4193f3b7cec24b76f4a9b868802b1a4c9d453743740cc228ae8ed65074.zip

  • Size

    3KB

  • Sample

    240727-v2x6mszgjj

  • MD5

    087a62e6280abfbd33685ffd284c2b90

  • SHA1

    26c026348073e00b8e8acbfab8a38a8ac50934a6

  • SHA256

    33c2b752e150ddf5f386875f3bdf5119cc327f36c2675639442a52f483bb7e02

  • SHA512

    04596295c92502901aea8ce8c73ba19f7d41d63c7790cfbfb9cfe77893fade4fab0523e9e401b00b1c8775ab6dd13f1757bb2e230dfca7e7171f45cab7cb2b02

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://drive.google.com/uc?export=download&id=

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.desckvbrat.com.br
  • Port:
    21
  • Username:
    desckvbrat
  • Password:
    159753Jp*

Targets

    • Target

      92bbfd4193f3b7cec24b76f4a9b868802b1a4c9d453743740cc228ae8ed65074

    • Size

      11KB

    • MD5

      12aca2637f3ce00c611462b2c663f9c1

    • SHA1

      23349f9d04fb1079b5f0a6a6338f336fc11ec71d

    • SHA256

      92bbfd4193f3b7cec24b76f4a9b868802b1a4c9d453743740cc228ae8ed65074

    • SHA512

      34faca763e8d808cc44b901188cfab0513cc24de3345bea9a2610c6ac029f98ae7e694131022196bf8ceb7e0f3dbe145219b707e3a6cad1a44321708f754a343

    • SSDEEP

      192:aussJcQAZ3I4QoSo9boKtO9hOiF+WsuWOJr+Bn4rFFewOgU76mAxPvVF:aussJcQAZ3I4vSWbftO9EG+luJrW4rFP

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

MITRE ATT&CK Enterprise v15

Tasks