General
-
Target
PO102983459pdf.zip
-
Size
121KB
-
Sample
230112-k9velsff32
-
MD5
a1371864f2663431d70d858495bc15ec
-
SHA1
15b19798cd95d33ecdfbfb6387ad68096a62dc3a
-
SHA256
f3309d927d3fda9e341efc21665b696ce01eb4548938c9e53ccef218e8cf5ba3
-
SHA512
e549f458faacf3ce06c1f8e74733759f0de00342f94c397a66a150077031605a13c8baaec5e9c6b4a1e81b47a13606828079f86b0844040e897c3f7e58aa3874
-
SSDEEP
3072:/d7EQF+Yq/pm8s1XSenVA3Lou/ZfmUiYQrf5pvCHS7RmAE:/dIDUNpV8beUiYi4SVmAE
Behavioral task
behavioral1
Sample
PO102983459pdf.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
PO102983459pdf.js
Resource
win10v2004-20220812-en
Malware Config
Extracted
wshrat
http://email15ssoscure.mydad.info:7123
Targets
-
-
Target
PO102983459pdf.js
-
Size
188KB
-
MD5
bc83816244612cf692c88784bf39314e
-
SHA1
f2b0aebbf7668f78344bcf2c5c6c739b0bdb4152
-
SHA256
f6cf56fadb9bc380881e8d653e2a9cbca6dd145d66b24b5d61fc8769fb45f12e
-
SHA512
a552a667c39799f391501bf8419a15147ed2d692543903f1c718ac38a51d89012cc2739be2c6539a06bab1813f5ef7b94782bb87fb18fbbf928a0f835b667e98
-
SSDEEP
3072:KyBsgQF1zZbbURCftbIpklgVDSxGfmuZnh6csQkFAQ0bamxvEzseGK/6H:KyBvQFIRCNAklgF2GuuZn+JMDreGK2
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-