General
-
Target
PO230317_COPY.vbs
-
Size
206KB
-
Sample
230317-kv19lsfc59
-
MD5
77a541634d4f73b6b242bdecd53c1231
-
SHA1
e5d9ae28229954bb0097e057a45f957913ac163f
-
SHA256
a296d00447ab6ebd54fb78afdeab1605246b0913130b870571ccaf7ae0117033
-
SHA512
ddb659c6ff0df990146ee5af48421161e15ab28c331ebc26bca5537859e390234d6f299e9d4f5a1513ef0c988042ef4c315f0a9e2dd5503f5c26f29827770e7d
-
SSDEEP
768:DMYP16f3e2+DCn6F4jTF9aieJHRzzFaKE/x0hGmVxYAYe3BH7LFHY:IYQngUKS
Static task
static1
Behavioral task
behavioral1
Sample
PO230317_COPY.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PO230317_COPY.vbs
Resource
win10v2004-20230220-en
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Targets
-
-
Target
PO230317_COPY.vbs
-
Size
206KB
-
MD5
77a541634d4f73b6b242bdecd53c1231
-
SHA1
e5d9ae28229954bb0097e057a45f957913ac163f
-
SHA256
a296d00447ab6ebd54fb78afdeab1605246b0913130b870571ccaf7ae0117033
-
SHA512
ddb659c6ff0df990146ee5af48421161e15ab28c331ebc26bca5537859e390234d6f299e9d4f5a1513ef0c988042ef4c315f0a9e2dd5503f5c26f29827770e7d
-
SSDEEP
768:DMYP16f3e2+DCn6F4jTF9aieJHRzzFaKE/x0hGmVxYAYe3BH7LFHY:IYQngUKS
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-