General
-
Target
3e1b30de-f946-42cd-85a4-cc60c6337553.js
-
Size
994KB
-
Sample
230131-max3kafh64
-
MD5
3e24fff43158556e25533e4b9ad50ffa
-
SHA1
0f681b9867dd9d2db193ffe668c6e401a95aa089
-
SHA256
723df9facfa6a4b8f4107a7dd238f7ef2b467fe995c103de7c9edd1692e9b25f
-
SHA512
0ce28b4ea4178b9cf9ee013227301bfb55c9f3d5b90152d180152975d271de637bed04dd2642b4aa412edcb7bf48f5c35d0ea8db78ce1957967709239910c797
-
SSDEEP
6144:eQfPBx5q0sQ1o7rsbHC01mDBpNW2mTMSbpuV8bubfQI+IGBYJje:eQ3B7qgpUbfo7
Static task
static1
Behavioral task
behavioral1
Sample
3e1b30de-f946-42cd-85a4-cc60c6337553.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3e1b30de-f946-42cd-85a4-cc60c6337553.js
Resource
win10v2004-20220812-en
Malware Config
Extracted
wshrat
http://oyo.powrkenken.info:46077
Targets
-
-
Target
3e1b30de-f946-42cd-85a4-cc60c6337553.js
-
Size
994KB
-
MD5
3e24fff43158556e25533e4b9ad50ffa
-
SHA1
0f681b9867dd9d2db193ffe668c6e401a95aa089
-
SHA256
723df9facfa6a4b8f4107a7dd238f7ef2b467fe995c103de7c9edd1692e9b25f
-
SHA512
0ce28b4ea4178b9cf9ee013227301bfb55c9f3d5b90152d180152975d271de637bed04dd2642b4aa412edcb7bf48f5c35d0ea8db78ce1957967709239910c797
-
SSDEEP
6144:eQfPBx5q0sQ1o7rsbHC01mDBpNW2mTMSbpuV8bubfQI+IGBYJje:eQ3B7qgpUbfo7
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-