General
-
Target
Documents for your perusal.js
-
Size
90KB
-
Sample
220616-dtldfahedl
-
MD5
e3a8ced8143a9c234569bf6537acb455
-
SHA1
dc687bbfcccb3740806c848a2b948f6f59f721ff
-
SHA256
d8267f242a04debd7ce7975644e938a4d54a6cbcfd5fd606b861d9faac7b8b4c
-
SHA512
db64c212f6b8237b9f4270828e9013456382941f0fdf80051164ef5e1fd2c9963042ae3ef9089cecbd2e0bf972e75db2d529ce20cc96364418c9e20598f6d8d5
Static task
static1
Behavioral task
behavioral1
Sample
Documents for your perusal.js
Resource
win7-20220414-en
Malware Config
Extracted
wshrat
http://79.134.225.5:8443
Targets
-
-
Target
Documents for your perusal.js
-
Size
90KB
-
MD5
e3a8ced8143a9c234569bf6537acb455
-
SHA1
dc687bbfcccb3740806c848a2b948f6f59f721ff
-
SHA256
d8267f242a04debd7ce7975644e938a4d54a6cbcfd5fd606b861d9faac7b8b4c
-
SHA512
db64c212f6b8237b9f4270828e9013456382941f0fdf80051164ef5e1fd2c9963042ae3ef9089cecbd2e0bf972e75db2d529ce20cc96364418c9e20598f6d8d5
-
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-