IOC Report
#U2749VER CUENTA#U2749_#U2467#U2464#U2465#U2466#U2465#U2466#U2463#U2462.hta

loading gif

Files

File Path
Type
Category
Malicious
#U2749VER CUENTA#U2749_#U2467#U2464#U2465#U2466#U2465#U2466#U2463#U2462.hta
HTML document, ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\Public\6720bdf2273b1.vbs
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\33CUD2J1\6720bdf2273ae[1].vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\_6720bdf2272bc\BLOCKBUSTER.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\AN5UOLP8\6720bdf227263[1].js
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
Composite Document File V2 Document, Cannot read section info
dropped
C:\_6720bdf2272bc\7zxa.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\_6720bdf2272bc\BLOCKBUSTER.dll
data
dropped
C:\_6720bdf2272bc\downloaded.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\_6720bdf2272bc\hc.dll
data
dropped
C:\_6720bdf2272bc\unrar.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 2 hidden files, click here to show them.

URLs

Name
IP
Malicious
http://109.234.39.156/mod-mx282/mx2810.zip
109.234.39.156
malicious
http://109.234.39.156/mx/mx2810.php?nomepc=user-PC
109.234.39.156
malicious

Domains

Name
IP
Malicious
acess.mailcffemx.com
172.67.195.227
malicious

IPs

IP
Domain
Country
Malicious
172.67.195.227
acess.mailcffemx.com
United States
malicious
109.234.39.156
unknown
Russian Federation
malicious
127.0.0.1
unknown
unknown