General
-
Target
87ec7ae8985a75396354ea6917cb53668ed0d416001bb77b559f6df5a6c7af94.js
-
Size
195KB
-
Sample
250117-gtzslsvjas
-
MD5
5fc9235bda05fc24e7305c04ca36ec23
-
SHA1
2e83ad6567e2d87bffc6392e26aca3c9e3f00c5a
-
SHA256
87ec7ae8985a75396354ea6917cb53668ed0d416001bb77b559f6df5a6c7af94
-
SHA512
183f6c9325fb539721ed7bb70996691c3f4448a70fb0d293fcb79abcbb14b3cf732ddf24892a030541b8387f7ab5f76ee8f74a99db1a267ec996c939c8b8b89c
-
SSDEEP
3072:lW1tKbWXt+NWXt+NWXt+NWXt+NWXt+NWXt+kWXt+NWXt+NWXt+NWXt+NWXt+NWXC:o
Static task
static1
Behavioral task
behavioral1
Sample
87ec7ae8985a75396354ea6917cb53668ed0d416001bb77b559f6df5a6c7af94.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
87ec7ae8985a75396354ea6917cb53668ed0d416001bb77b559f6df5a6c7af94.js
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://desckvbrat.com.br/Upcrypter/02/Meu_primeiro_arquivo_de_texto.txt
https://drive.google.com/uc?export=download&id=
https://desckvbrat.com.br/Upcrypter/02/Meu_primeiro_arquivo_de_texto.txt
Targets
-
-
Target
87ec7ae8985a75396354ea6917cb53668ed0d416001bb77b559f6df5a6c7af94.js
-
Size
195KB
-
MD5
5fc9235bda05fc24e7305c04ca36ec23
-
SHA1
2e83ad6567e2d87bffc6392e26aca3c9e3f00c5a
-
SHA256
87ec7ae8985a75396354ea6917cb53668ed0d416001bb77b559f6df5a6c7af94
-
SHA512
183f6c9325fb539721ed7bb70996691c3f4448a70fb0d293fcb79abcbb14b3cf732ddf24892a030541b8387f7ab5f76ee8f74a99db1a267ec996c939c8b8b89c
-
SSDEEP
3072:lW1tKbWXt+NWXt+NWXt+NWXt+NWXt+NWXt+kWXt+NWXt+NWXt+NWXt+NWXt+NWXC:o
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-