General
-
Target
8487327083.zip
-
Size
169KB
-
Sample
221130-kx75yaeh93
-
MD5
58116e27b75ed0549ab87f6216e2a953
-
SHA1
2354de0ed15818a5999ff2662e06d3979797b17c
-
SHA256
fe18a09be16b7490b0ee0f7445b9fe20d2b5ec602aacd06fc8a86c087252615c
-
SHA512
97b45073ab6124b137ae58af761a8635c097aa07a0943542d14e63e7c559b8fe71b57ab2d8d0b62eaa1c92c1ecf0ae587f1d7f750514de8829cdb6a548f938ba
-
SSDEEP
3072:gJiFwcQca2aJqz9uac2u4HHmjXq3e8FJRA9JZGCz3Nuhx3vUW838N3pdQzY9NPn:g4wJ2/uqni63RJRSrGY38/UW83Ap8cZ
Static task
static1
Behavioral task
behavioral1
Sample
8487327083.zip
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
Order-Inquiry-020-10-28-22.js
Resource
win10-20220812-en
Malware Config
Extracted
wshrat
http://grace-fax.home-webserver.de:24150
Targets
-
-
Target
8487327083.zip
-
Size
169KB
-
MD5
58116e27b75ed0549ab87f6216e2a953
-
SHA1
2354de0ed15818a5999ff2662e06d3979797b17c
-
SHA256
fe18a09be16b7490b0ee0f7445b9fe20d2b5ec602aacd06fc8a86c087252615c
-
SHA512
97b45073ab6124b137ae58af761a8635c097aa07a0943542d14e63e7c559b8fe71b57ab2d8d0b62eaa1c92c1ecf0ae587f1d7f750514de8829cdb6a548f938ba
-
SSDEEP
3072:gJiFwcQca2aJqz9uac2u4HHmjXq3e8FJRA9JZGCz3Nuhx3vUW838N3pdQzY9NPn:g4wJ2/uqni63RJRSrGY38/UW83Ap8cZ
Score1/10 -
-
-
Target
Order-Inquiry-020-10-28-22.js
-
Size
257KB
-
MD5
144bc81f1a91e281159dd7e51ebe682c
-
SHA1
3eeaa18af60d63898787411867c0cf26e760658e
-
SHA256
ebb80911d7d1b734fdafbf50f11b3cdf127a7a94a21201984d47b0bb6d47ca33
-
SHA512
a19701cb690b457acc9925a31e44c6f5d0c09f5bb939a7158d5e29f3d2757c252766271f9e5a5886550f4eed29c133c3b12d4313d4192198994eaf0012f6bbe2
-
SSDEEP
3072:nzsF5ejqKQKWGeIzuyR/I2MWJcsVfeaWYRfzbpdCltDvuLTrPFztzI0utitb0k2j:4FhGruytJQYRfRguLpt0ZtcVsCV+6E
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-