General
-
Target
229051b5b85ba5aff1265ef5f953b89986b1343960c35550eae70170b1e6d2e1.unknown
-
Size
690KB
-
Sample
240924-bhqsns1hql
-
MD5
cc8e7dd9844aae2c0c5363c9df098c26
-
SHA1
42f8b641a91e51ba6dd605ad3af4a2b4d493eb43
-
SHA256
229051b5b85ba5aff1265ef5f953b89986b1343960c35550eae70170b1e6d2e1
-
SHA512
3615a25efb2f51bd91fc64fff35352d0d99e1f41bccb8c8e0c484813378327ab580790372dfde34a2ddca158337e5c6e1e051bc235c6b6d43d9a0f8b3cd4de6a
-
SSDEEP
1536:VPPPPPPPPPPPPPPPPPPPPPPPE77777777777777777777777777777777777777C:YfRXe
Static task
static1
Behavioral task
behavioral1
Sample
229051b5b85ba5aff1265ef5f953b89986b1343960c35550eae70170b1e6d2e1.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
229051b5b85ba5aff1265ef5f953b89986b1343960c35550eae70170b1e6d2e1.vbs
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=
Extracted
Protocol: ftp- Host:
ftp.desckvbrat.com.br - Port:
21 - Username:
desckvbrat1 - Password:
developerpro21578Jp@@
Targets
-
-
Target
229051b5b85ba5aff1265ef5f953b89986b1343960c35550eae70170b1e6d2e1.unknown
-
Size
690KB
-
MD5
cc8e7dd9844aae2c0c5363c9df098c26
-
SHA1
42f8b641a91e51ba6dd605ad3af4a2b4d493eb43
-
SHA256
229051b5b85ba5aff1265ef5f953b89986b1343960c35550eae70170b1e6d2e1
-
SHA512
3615a25efb2f51bd91fc64fff35352d0d99e1f41bccb8c8e0c484813378327ab580790372dfde34a2ddca158337e5c6e1e051bc235c6b6d43d9a0f8b3cd4de6a
-
SSDEEP
1536:VPPPPPPPPPPPPPPPPPPPPPPPE77777777777777777777777777777777777777C:YfRXe
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-