General
-
Target
LPO-17-006AD.js
-
Size
51KB
-
Sample
221205-k1m9yadg58
-
MD5
72223261b52503ff105d48cd259b57bb
-
SHA1
35bba466691abc491ca3a831a434b6c2fca5a086
-
SHA256
9343e04859def1edc843bc315fe68b3e9af894c82d403bc2410247f542e1cfd7
-
SHA512
0c8558b245dcc803d22f5de7be7e3bfb8e65904e606fff6676ccab64692183e152b6828d5d493c87f552fed421e610cfc50237b3307f1bac7fe11d5d7db34376
-
SSDEEP
1536:0AcjP620ZCqxJ5I7k9ILcmgK+g9XkSsSYBnP:0Vj2ZlxJ5KgKGP
Static task
static1
Behavioral task
behavioral1
Sample
LPO-17-006AD.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
LPO-17-006AD.js
Resource
win10v2004-20220812-en
Malware Config
Extracted
wshrat
http://45.139.105.174:2070
Targets
-
-
Target
LPO-17-006AD.js
-
Size
51KB
-
MD5
72223261b52503ff105d48cd259b57bb
-
SHA1
35bba466691abc491ca3a831a434b6c2fca5a086
-
SHA256
9343e04859def1edc843bc315fe68b3e9af894c82d403bc2410247f542e1cfd7
-
SHA512
0c8558b245dcc803d22f5de7be7e3bfb8e65904e606fff6676ccab64692183e152b6828d5d493c87f552fed421e610cfc50237b3307f1bac7fe11d5d7db34376
-
SSDEEP
1536:0AcjP620ZCqxJ5I7k9ILcmgK+g9XkSsSYBnP:0Vj2ZlxJ5KgKGP
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-