General
-
Target
#U6ce8#U6587#U4ed5#U69d8#U66f8.vbs
-
Size
562KB
-
Sample
241003-d39sdsselk
-
MD5
29234d373b3118d99da44ae211f227a5
-
SHA1
f084f4248be8e1e13e4c6ddf5388e7eafc4a6b4a
-
SHA256
bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3
-
SHA512
d434084bf1b635b527ac6b715a8a22202387699a522c759265f6e7f01e369cefeec62c87b582a2ad29711c7524af15c5d66b45cd038732cad44df3ab3e97c1f7
-
SSDEEP
1536:kmmmmmmmmmmmmmmmmmmyFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFl:pP
Static task
static1
Behavioral task
behavioral1
Sample
#U6ce8#U6587#U4ed5#U69d8#U66f8.vbs
Resource
win7-20240903-ja
Behavioral task
behavioral2
Sample
#U6ce8#U6587#U4ed5#U69d8#U66f8.vbs
Resource
win10v2004-20240802-ja
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=
Extracted
Protocol: ftp- Host:
ftp.desckvbrat.com.br - Port:
21 - Username:
desckvbrat1 - Password:
developerpro21578Jp@@
Targets
-
-
Target
#U6ce8#U6587#U4ed5#U69d8#U66f8.vbs
-
Size
562KB
-
MD5
29234d373b3118d99da44ae211f227a5
-
SHA1
f084f4248be8e1e13e4c6ddf5388e7eafc4a6b4a
-
SHA256
bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3
-
SHA512
d434084bf1b635b527ac6b715a8a22202387699a522c759265f6e7f01e369cefeec62c87b582a2ad29711c7524af15c5d66b45cd038732cad44df3ab3e97c1f7
-
SSDEEP
1536:kmmmmmmmmmmmmmmmmmmyFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFl:pP
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-