General
-
Target
92bbfd4193f3b7cec24b76f4a9b868802b1a4c9d453743740cc228ae8ed65074.zip
-
Size
3KB
-
Sample
240727-v2x6mszgjj
-
MD5
087a62e6280abfbd33685ffd284c2b90
-
SHA1
26c026348073e00b8e8acbfab8a38a8ac50934a6
-
SHA256
33c2b752e150ddf5f386875f3bdf5119cc327f36c2675639442a52f483bb7e02
-
SHA512
04596295c92502901aea8ce8c73ba19f7d41d63c7790cfbfb9cfe77893fade4fab0523e9e401b00b1c8775ab6dd13f1757bb2e230dfca7e7171f45cab7cb2b02
Static task
static1
Behavioral task
behavioral1
Sample
92bbfd4193f3b7cec24b76f4a9b868802b1a4c9d453743740cc228ae8ed65074.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
92bbfd4193f3b7cec24b76f4a9b868802b1a4c9d453743740cc228ae8ed65074.js
Resource
win10v2004-20240709-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=
Extracted
Protocol: ftp- Host:
ftp.desckvbrat.com.br - Port:
21 - Username:
desckvbrat - Password:
159753Jp*
Targets
-
-
Target
92bbfd4193f3b7cec24b76f4a9b868802b1a4c9d453743740cc228ae8ed65074
-
Size
11KB
-
MD5
12aca2637f3ce00c611462b2c663f9c1
-
SHA1
23349f9d04fb1079b5f0a6a6338f336fc11ec71d
-
SHA256
92bbfd4193f3b7cec24b76f4a9b868802b1a4c9d453743740cc228ae8ed65074
-
SHA512
34faca763e8d808cc44b901188cfab0513cc24de3345bea9a2610c6ac029f98ae7e694131022196bf8ceb7e0f3dbe145219b707e3a6cad1a44321708f754a343
-
SSDEEP
192:aussJcQAZ3I4QoSo9boKtO9hOiF+WsuWOJr+Bn4rFFewOgU76mAxPvVF:aussJcQAZ3I4vSWbftO9EG+luJrW4rFP
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-