IOC Report
#U2749VER_COMPROVATIVO#U2749_#U2467#U2467#U2462#U2462#U2467#U2461#U2464#U2463.hta

loading gif

Files

File Path
Type
Category
Malicious
#U2749VER_COMPROVATIVO#U2749_#U2467#U2467#U2462#U2462#U2467#U2461#U2464#U2463.hta
HTML document, ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\Public\6720c012c78cd.vbs
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\96LGQ1XY\6720c012c78c7[1].vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\_6720c012c774c\BLOCKBUSTER.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\5IQBCSP1\pt2810[1].zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GO30WR0E\6720c012c76dc[1].js
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
Composite Document File V2 Document, Cannot read section info
dropped
C:\_6720c012c774c\7zxa.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\_6720c012c774c\BLOCKBUSTER.dll
data
dropped
C:\_6720c012c774c\hc.dll
data
dropped
C:\_6720c012c774c\unrar.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 2 hidden files, click here to show them.

URLs

Name
IP
Malicious
http://109.234.39.156/mod-pt28/pt2810.zip
109.234.39.156
malicious
http://109.234.39.156/pt/pt28.php?nomepc=user-PC
109.234.39.156
malicious

Domains

Name
IP
Malicious
apps.downloadaps.com
172.67.155.19
malicious

IPs

IP
Domain
Country
Malicious
109.234.39.156
unknown
Russian Federation
malicious
172.67.155.19
apps.downloadaps.com
United States
malicious
127.0.0.1
unknown
unknown