General
-
Target
PO.230029.rar
-
Size
230KB
-
Sample
230215-yx9knadg96
-
MD5
6fbf79929549795aa479bf75b8f200c3
-
SHA1
83da86e16883fa4192f57333c7912ca1cc6f122f
-
SHA256
6170f6b6d0e8b91a5fd037a7322bfe80471b982c066fd1ea64e588eaad3147b1
-
SHA512
5e6ae9dc3cf1c0baa5c33ba0913ebd213123f297865aa69b2c97c2326b609ce4abad4c43c59b674537fd409985f03dc7c08a7b504184b55344f2e2af0e396a4c
-
SSDEEP
6144:VyUlZ1WcisqyjQHaMVv+e42wAzdq3+ly8K7aDNdr:VyURbqeQHhv+el1dqWy/7Kf
Static task
static1
Behavioral task
behavioral1
Sample
PO.230029.js
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
PO.230029.js
Resource
win10v2004-20221111-en
Malware Config
Extracted
wshrat
http://datalogs33.ddns.net:48665
Targets
-
-
Target
PO.230029.js
-
Size
3.5MB
-
MD5
2760f9a45e9e74c4eedfe9b0ee918e6b
-
SHA1
277c62b14c987da3cf4c9e7d4ee4478cf61580c7
-
SHA256
18827fed6ecd5e4d2c548dcad1eb21730a95f52b578bed75e3003b06a7390482
-
SHA512
45aa5c7a51f644e82fc436029187fef542ee9a3be80ed8c3535c0383c938509f4d3f4414c97328430092bec1eed5a5105d47f45f36664f49c63a146b12a9fb7e
-
SSDEEP
6144:nDKcCNX9cMH0svW5he7NbWSRU9qB02HkyjM6P:nDupdf
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-