General
-
Target
Purchase Inquiry AS894 - SG633.js
-
Size
90KB
-
Sample
220616-kl1aysbcbl
-
MD5
ef6bd6f33894ed4aa9dfd7b008fb3848
-
SHA1
f0d5020b90e63e67f8a37619f347c932d35cdd7a
-
SHA256
fe71d2ce160281f80957f5a01d72538a497d305e30aa8fbcdf105fd6034f2d8c
-
SHA512
9452a773fb193724eb1e130d180cc1f0a3c58329badffeeb134db8671df981994058bdce1ab758f5d4289b5c3a7d8bb3465201323fabac43c550199b7404b1ab
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Inquiry AS894 - SG633.js
Resource
win7-20220414-en
Malware Config
Extracted
wshrat
http://62.102.148.154:4044
Targets
-
-
Target
Purchase Inquiry AS894 - SG633.js
-
Size
90KB
-
MD5
ef6bd6f33894ed4aa9dfd7b008fb3848
-
SHA1
f0d5020b90e63e67f8a37619f347c932d35cdd7a
-
SHA256
fe71d2ce160281f80957f5a01d72538a497d305e30aa8fbcdf105fd6034f2d8c
-
SHA512
9452a773fb193724eb1e130d180cc1f0a3c58329badffeeb134db8671df981994058bdce1ab758f5d4289b5c3a7d8bb3465201323fabac43c550199b7404b1ab
-
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-