General
-
Target
PAYMENT FOR INV.js
-
Size
254KB
-
Sample
221221-t1c9eafg5z
-
MD5
acca18f941aa76254ad8b70486012863
-
SHA1
02313c293c860237159cf81761cc65585273daea
-
SHA256
7019e1c5a3d9516d62c6557d68b60f7751d68ce0e369d868387e90a0749ccb68
-
SHA512
8d88f4fdf8a66d867faf5683ea983ef68b0f565c9e62ebe1429e4619ef127257d0643f462215232a0619b5ec9c0fcbc96cc950a6cc5c1e10084aab1f18e10e84
-
SSDEEP
3072:GdXY/+yAsOAY2Mcj+wlq22tOBqEFRDectBp3/hgbTjBIxPBrz480jad/8nUuiVvF:aDA5Mcj+wj2ctBNJUI/rcLjMuOIK8wpl
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT FOR INV.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PAYMENT FOR INV.js
Resource
win10v2004-20220812-en
Malware Config
Extracted
wshrat
http://80.76.51.124:1965
Targets
-
-
Target
PAYMENT FOR INV.js
-
Size
254KB
-
MD5
acca18f941aa76254ad8b70486012863
-
SHA1
02313c293c860237159cf81761cc65585273daea
-
SHA256
7019e1c5a3d9516d62c6557d68b60f7751d68ce0e369d868387e90a0749ccb68
-
SHA512
8d88f4fdf8a66d867faf5683ea983ef68b0f565c9e62ebe1429e4619ef127257d0643f462215232a0619b5ec9c0fcbc96cc950a6cc5c1e10084aab1f18e10e84
-
SSDEEP
3072:GdXY/+yAsOAY2Mcj+wlq22tOBqEFRDectBp3/hgbTjBIxPBrz480jad/8nUuiVvF:aDA5Mcj+wj2ctBNJUI/rcLjMuOIK8wpl
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-