General
-
Target
Payment Proof.js
-
Size
1.0MB
-
Sample
221221-wdfr5afh4v
-
MD5
ffa58d4c1cdaa668c70ac759084a1455
-
SHA1
b34653f7776c84cfb3800e584728193ee833d36a
-
SHA256
ccee0d9c31d2d4823313c01a581fc44a63b6745144a36253519782b446efb048
-
SHA512
400ef6f6b9643d0a89628b22cc0af6704f7227f3e42842757f6f41480b5ce74a1c0b3a4449ebe410f0fc1776f6ee4c023dc9f0183eabad0697d1225712005f0b
-
SSDEEP
12288:GtHYDeDuDLzi5Z1aezTLuYsv/2sXAi1vDPZ7bC0ntzGeq:Y6eruYsv/2sXAi1vhbVzTq
Static task
static1
Behavioral task
behavioral1
Sample
Payment Proof.js
Resource
win7-20221111-en
Malware Config
Extracted
wshrat
http://185.246.220.208:5359
Targets
-
-
Target
Payment Proof.js
-
Size
1.0MB
-
MD5
ffa58d4c1cdaa668c70ac759084a1455
-
SHA1
b34653f7776c84cfb3800e584728193ee833d36a
-
SHA256
ccee0d9c31d2d4823313c01a581fc44a63b6745144a36253519782b446efb048
-
SHA512
400ef6f6b9643d0a89628b22cc0af6704f7227f3e42842757f6f41480b5ce74a1c0b3a4449ebe410f0fc1776f6ee4c023dc9f0183eabad0697d1225712005f0b
-
SSDEEP
12288:GtHYDeDuDLzi5Z1aezTLuYsv/2sXAi1vDPZ7bC0ntzGeq:Y6eruYsv/2sXAi1vhbVzTq
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-