General
-
Target
13112024_0333_Sign021000110.vbs.zip
-
Size
167KB
-
Sample
241113-d4gs1ayngm
-
MD5
8b9b98ab6a47e9506a4a3fe34f25ef04
-
SHA1
31142bad93e491c957d98a76f68acd71ee79fef6
-
SHA256
5eabf43f84b1893eb00a36c0c49eb140eb675553efa0811e6c60ade477ccf58a
-
SHA512
0ff8fca6b0607b78e1e79052162348065a91a1ace9098dc1009950c6cb7acfdb5d25d1865944ce342f05e7195ee095aeb060ba58243321a7a3d67bf5ab53de53
-
SSDEEP
1536:ruAvuAvuAvuAvuAvuAvuAvuAvuAvuAKFZBfuAvuAvuAvuAvuAvuAvuAvuAvuAvuq:C555555555Y5555555555555555U
Static task
static1
Behavioral task
behavioral1
Sample
Sign021000110.vbs
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Sign021000110.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=
Extracted
Protocol: ftp- Host:
ftp.desckvbrat.com.br - Port:
21 - Username:
desckvbrat1 - Password:
mfnEdMDLnE@@1578
Targets
-
-
Target
Sign021000110.vbs
-
Size
166KB
-
MD5
c9334c842ef061551279d98b8b48e1b2
-
SHA1
a794c208ab09fe3d9631c377a7411dda9fcdc46c
-
SHA256
505955df69d2bf11e756749c6ea8e8998a2fe26e1efa5542fbf6961233bdd317
-
SHA512
c4e41b8117eb461e122497198daa231e722ef76805fc82cb6274edabf3a8f3f9e0395bfc6a80a3fb0ac9c671dfb9e6324f6953090f90d4e9ff4f2116980dbeb3
-
SSDEEP
1536:5uAvuAvuAvuAvuAvuAvuAvuAvuAvuAKFZBfuAvuAvuAvuAvuAvuAvuAvuAvuAvuh:g555555555Y5555555555555555/
-
Detects ZharkBot payload
ZharkBot is a botnet written C++.
-
Zharkbot family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
1File Deletion
1Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1