General

  • Target

    13112024_0333_Sign021000110.vbs.zip

  • Size

    167KB

  • Sample

    241113-d4gs1ayngm

  • MD5

    8b9b98ab6a47e9506a4a3fe34f25ef04

  • SHA1

    31142bad93e491c957d98a76f68acd71ee79fef6

  • SHA256

    5eabf43f84b1893eb00a36c0c49eb140eb675553efa0811e6c60ade477ccf58a

  • SHA512

    0ff8fca6b0607b78e1e79052162348065a91a1ace9098dc1009950c6cb7acfdb5d25d1865944ce342f05e7195ee095aeb060ba58243321a7a3d67bf5ab53de53

  • SSDEEP

    1536:ruAvuAvuAvuAvuAvuAvuAvuAvuAvuAKFZBfuAvuAvuAvuAvuAvuAvuAvuAvuAvuq:C555555555Y5555555555555555U

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://drive.google.com/uc?export=download&id=

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.desckvbrat.com.br
  • Port:
    21
  • Username:
    desckvbrat1
  • Password:
    mfnEdMDLnE@@1578

Targets

    • Target

      Sign021000110.vbs

    • Size

      166KB

    • MD5

      c9334c842ef061551279d98b8b48e1b2

    • SHA1

      a794c208ab09fe3d9631c377a7411dda9fcdc46c

    • SHA256

      505955df69d2bf11e756749c6ea8e8998a2fe26e1efa5542fbf6961233bdd317

    • SHA512

      c4e41b8117eb461e122497198daa231e722ef76805fc82cb6274edabf3a8f3f9e0395bfc6a80a3fb0ac9c671dfb9e6324f6953090f90d4e9ff4f2116980dbeb3

    • SSDEEP

      1536:5uAvuAvuAvuAvuAvuAvuAvuAvuAvuAKFZBfuAvuAvuAvuAvuAvuAvuAvuAvuAvuh:g555555555Y5555555555555555/

    • Detects ZharkBot payload

      ZharkBot is a botnet written C++.

    • ZharkBot

      ZharkBot is a botnet written C++.

    • Zharkbot family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Legitimate hosting services abused for malware hosting/C2

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks