General
-
Target
Spe00002.js
-
Size
1.3MB
-
Sample
230202-h3slbshc71
-
MD5
d2d74972732d9af034ec0fb7bdf6b639
-
SHA1
467f3fdff8f759d184794558a64c8207c6951f03
-
SHA256
d835e918736fdcbe6a4b952f59059d9d1df2956f5c63758ed626cb2571a3e7ea
-
SHA512
a4f58468403452b28ca533d0feb2767c4fa2ed22904915171c5205a0fecb2d223714a05311a7c71f1c3ec0a7e3e689121dd3cbd7220a44956c25ec2de635201b
-
SSDEEP
6144:h1GlgoQx3ZUiezJ54oUViONwG/IkXpVUyrw7+Hjr5UFko+/clqoJ89laGHZ7RtAO:mHQxFukHUvtbpC
Static task
static1
Behavioral task
behavioral1
Sample
Spe00002.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Spe00002.js
Resource
win10v2004-20220812-en
Malware Config
Extracted
wshrat
http://155.94.209.44:7121
Targets
-
-
Target
Spe00002.js
-
Size
1.3MB
-
MD5
d2d74972732d9af034ec0fb7bdf6b639
-
SHA1
467f3fdff8f759d184794558a64c8207c6951f03
-
SHA256
d835e918736fdcbe6a4b952f59059d9d1df2956f5c63758ed626cb2571a3e7ea
-
SHA512
a4f58468403452b28ca533d0feb2767c4fa2ed22904915171c5205a0fecb2d223714a05311a7c71f1c3ec0a7e3e689121dd3cbd7220a44956c25ec2de635201b
-
SSDEEP
6144:h1GlgoQx3ZUiezJ54oUViONwG/IkXpVUyrw7+Hjr5UFko+/clqoJ89laGHZ7RtAO:mHQxFukHUvtbpC
Score10/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-