General
-
Target
e759742e2878b202f658cb2d8984e120.bin
-
Size
8KB
-
Sample
230322-cglyrsec87
-
MD5
b0cd9014adfe3072756d7f7568363ef3
-
SHA1
a059106c68570d1c820330a51bd38503f8c23345
-
SHA256
c6db55b7e77e4d381d218b591bdc86db1e92355acb7be82d77042d87dada63b0
-
SHA512
1865f6a2ff6bf686e4019ab0c7f61d95062521669372c746c018bf2fb3c62cea33a209d6d87020ed5a57c13bb680f6143525eb63089b8ce39f2e6b903abef0b6
-
SSDEEP
192:hG7gKhDdaZnFcvS1S8HPFdWghfcEFmY0eGJOJ4UjNPhYVCD+A3uBmK:LKhD8ZnG0/3h5FbrG8J4UjsQ+wK
Static task
static1
Behavioral task
behavioral1
Sample
ORDER_230320.pdf.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ORDER_230320.pdf.vbs
Resource
win10v2004-20230220-en
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Targets
-
-
Target
ORDER_230320.pdf.vbs
-
Size
267KB
-
MD5
a4876007d9afb92163ed9933656eacbd
-
SHA1
8eafbf2887bb39ac089c95b50bf34fd27b7ee36f
-
SHA256
a58c4155a01aab820977ec8d2880edc9408b320f54ec7089db79e50da1b525a7
-
SHA512
8db4e28e3e1718416c1a3dfe7d461efd429345621f30bfe2f3b67532e2c26833a53b57a89cd4b3587488bf017926076b12b92ec15e1868babe5ded766cfa335c
-
SSDEEP
768:NGiZmuiZO+YlWGNOHGxOrBr/kXiFs6d3f9GdsGd+9dP1EC4SV5BW:l
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-