General
-
Target
ba164adf0e3d7ada31a03e9bf73e26f5.WSF
-
Size
31KB
-
Sample
241217-s7lnpasmcv
-
MD5
ba164adf0e3d7ada31a03e9bf73e26f5
-
SHA1
2580810407a9e6189d3ea643c6a49679babf230c
-
SHA256
61801bf75d5af4f325190112cdd42e811a857d77284db0cd8022f926ae922823
-
SHA512
c674aeb0c34c9b9c66b99384f5a75ab77aad9c14356f33a0ef741325f1de455af635f73bc14b8283ed7890cfbf875adbfb9d48a84904cd080a6f22962dba9e57
-
SSDEEP
768:i+vnInInInInInInInIncnjnInInInInInInInInInInInInInInInInm:i+f22222222yL2222222222222222m
Static task
static1
Behavioral task
behavioral1
Sample
ba164adf0e3d7ada31a03e9bf73e26f5.wsf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ba164adf0e3d7ada31a03e9bf73e26f5.wsf
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://desckvbrat.com.br/Upcrypter/01/DLL01.txt
https://drive.google.com/uc?export=download&id=
https://desckvbrat.com.br/Upcrypter/01/DLL01.txt
Targets
-
-
Target
ba164adf0e3d7ada31a03e9bf73e26f5.WSF
-
Size
31KB
-
MD5
ba164adf0e3d7ada31a03e9bf73e26f5
-
SHA1
2580810407a9e6189d3ea643c6a49679babf230c
-
SHA256
61801bf75d5af4f325190112cdd42e811a857d77284db0cd8022f926ae922823
-
SHA512
c674aeb0c34c9b9c66b99384f5a75ab77aad9c14356f33a0ef741325f1de455af635f73bc14b8283ed7890cfbf875adbfb9d48a84904cd080a6f22962dba9e57
-
SSDEEP
768:i+vnInInInInInInInIncnjnInInInInInInInInInInInInInInInInm:i+f22222222yL2222222222222222m
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-