General
-
Target
itinerarydetails.pdf.vbs
-
Size
97KB
-
Sample
241211-t9ehtswjak
-
MD5
a64af1eb173a81ce83d8688582925a20
-
SHA1
0c4fbcfe1313d577199dacd5593824344e61ab1a
-
SHA256
c32c454ae2dba633e5f9e7222bb06a49c2841886689b7b4961013ec3dc9e722e
-
SHA512
82f7195508c8cb1abd524f94783bf352d46918090ab8c51a50a73d83e176573f8175769a4fe90fbac2c0bb83d516f8058bca89e9a8acda810f66adc92de2da16
-
SSDEEP
768:MjjjjjjjDWuF78+OUCp+aejjjjjjjjjjjjjjjjj3:tuFvYQX
Static task
static1
Behavioral task
behavioral1
Sample
itinerarydetails.pdf.vbs
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
itinerarydetails.pdf.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://desckvbrat.com.br/Upcrypter/01/DLL01.txt
https://drive.google.com/uc?export=download&id=
https://desckvbrat.com.br/Upcrypter/01/DLL01.txt
Targets
-
-
Target
itinerarydetails.pdf.vbs
-
Size
97KB
-
MD5
a64af1eb173a81ce83d8688582925a20
-
SHA1
0c4fbcfe1313d577199dacd5593824344e61ab1a
-
SHA256
c32c454ae2dba633e5f9e7222bb06a49c2841886689b7b4961013ec3dc9e722e
-
SHA512
82f7195508c8cb1abd524f94783bf352d46918090ab8c51a50a73d83e176573f8175769a4fe90fbac2c0bb83d516f8058bca89e9a8acda810f66adc92de2da16
-
SSDEEP
768:MjjjjjjjDWuF78+OUCp+aejjjjjjjjjjjjjjjjj3:tuFvYQX
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-