General
-
Target
Ödeme Onayı.vbs
-
Size
586KB
-
Sample
241102-3mysmayjdt
-
MD5
dbc2b2c1ad1e78348f9336869fbf0740
-
SHA1
7903a4142cb3c3e588710691a8577e5b7ee3c6c6
-
SHA256
c27d49863e35526b0ff42b2799c27fcf72bd8f246e410ca83134dd26e7f54b0f
-
SHA512
b4751bcaa288a9f0c74e7fac9bd7e9dc74422c71694300debdefebdc42bc077016bb07b2d928be4eb4d9cb16b18e744be35c82d2e2a53a7a0c290692772b94b2
-
SSDEEP
1536:coooooooooooooooooC99999999999999999999999999999999999999999999/:v3Jg6azbLal3Jg6azbLal3Jg6azbLaO
Static task
static1
Behavioral task
behavioral1
Sample
Ödeme Onayı.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Ödeme Onayı.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=
Extracted
Protocol: ftp- Host:
ftp.desckvbrat.com.br - Port:
21 - Username:
desckvbrat1 - Password:
BFwGyaUBMY1578@@
Targets
-
-
Target
Ödeme Onayı.vbs
-
Size
586KB
-
MD5
dbc2b2c1ad1e78348f9336869fbf0740
-
SHA1
7903a4142cb3c3e588710691a8577e5b7ee3c6c6
-
SHA256
c27d49863e35526b0ff42b2799c27fcf72bd8f246e410ca83134dd26e7f54b0f
-
SHA512
b4751bcaa288a9f0c74e7fac9bd7e9dc74422c71694300debdefebdc42bc077016bb07b2d928be4eb4d9cb16b18e744be35c82d2e2a53a7a0c290692772b94b2
-
SSDEEP
1536:coooooooooooooooooC99999999999999999999999999999999999999999999/:v3Jg6azbLal3Jg6azbLal3Jg6azbLaO
Score10/10-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
1File Deletion
1Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1