General
-
Target
ORDER_230320.pdf_1.xz
-
Size
8KB
-
Sample
230320-xm2xdsgh6y
-
MD5
e759742e2878b202f658cb2d8984e120
-
SHA1
62c73cc606d5856dcfc81d0e37e821fd8594cd7e
-
SHA256
ce2082e44afef92b5997869f6e17cfadd6326390c398c6316afda1a5eaedbd5f
-
SHA512
a0f45e51aba7281caf379dfead4c4ccbad9c90ddc65e596c0a6fe7c415b50c56cce03c34ac0ccd6272b20afe35c8a64919748e8ca87c05ee26af146ce7ff8ced
-
SSDEEP
192:ElxluqMkH20Hr/HJdEztyiCHttlwoV434KpyBuurUagx:qluWPL/HJ6o3HttjVCcAurUaG
Static task
static1
Behavioral task
behavioral1
Sample
ORDER_230320.pdf.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ORDER_230320.pdf.vbs
Resource
win10v2004-20230220-en
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Targets
-
-
Target
ORDER_230320.pdf.vbs
-
Size
267KB
-
MD5
a4876007d9afb92163ed9933656eacbd
-
SHA1
8eafbf2887bb39ac089c95b50bf34fd27b7ee36f
-
SHA256
a58c4155a01aab820977ec8d2880edc9408b320f54ec7089db79e50da1b525a7
-
SHA512
8db4e28e3e1718416c1a3dfe7d461efd429345621f30bfe2f3b67532e2c26833a53b57a89cd4b3587488bf017926076b12b92ec15e1868babe5ded766cfa335c
-
SSDEEP
768:NGiZmuiZO+YlWGNOHGxOrBr/kXiFs6d3f9GdsGd+9dP1EC4SV5BW:l
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-