General
-
Target
72165d54d7e77e68ec5263d8ea9f5041.WSF
-
Size
30KB
-
Sample
241216-3c8vvatqdm
-
MD5
72165d54d7e77e68ec5263d8ea9f5041
-
SHA1
10c21f74c5b3f7b7807b6699f7abf00078521b8f
-
SHA256
8e77a55f8b5baea2e55a7304ef01d1bc3750d8e2d453c49be52501e38b993ace
-
SHA512
5e8fb5f8a6f14fd42826271bc6b84da2d636e85a1bfe1f478a0bd2c309b5bd1e9ab98d03606aba3abbaad335a10f0fcbd713c13f9ff89e5be04148e965f267bd
-
SSDEEP
96:zJAkdWKWiXW2W2WDAgFOPBAFFOPBAFFOPBAFFOPBAFFOPBAFFOPBAFFOPBAFFOPu:XPPPPPPPPDL2PPPPPPPPPPPPPPPPf
Static task
static1
Behavioral task
behavioral1
Sample
72165d54d7e77e68ec5263d8ea9f5041.wsf
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
72165d54d7e77e68ec5263d8ea9f5041.wsf
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://desckvbrat.com.br/Upcrypter/01/DLL01.txt
https://drive.google.com/uc?export=download&id=
https://desckvbrat.com.br/Upcrypter/01/DLL01.txt
Targets
-
-
Target
72165d54d7e77e68ec5263d8ea9f5041.WSF
-
Size
30KB
-
MD5
72165d54d7e77e68ec5263d8ea9f5041
-
SHA1
10c21f74c5b3f7b7807b6699f7abf00078521b8f
-
SHA256
8e77a55f8b5baea2e55a7304ef01d1bc3750d8e2d453c49be52501e38b993ace
-
SHA512
5e8fb5f8a6f14fd42826271bc6b84da2d636e85a1bfe1f478a0bd2c309b5bd1e9ab98d03606aba3abbaad335a10f0fcbd713c13f9ff89e5be04148e965f267bd
-
SSDEEP
96:zJAkdWKWiXW2W2WDAgFOPBAFFOPBAFFOPBAFFOPBAFFOPBAFFOPBAFFOPBAFFOPu:XPPPPPPPPDL2PPPPPPPPPPPPPPPPf
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-