General
-
Target
ORDER28033.xls.vbs
-
Size
234KB
-
Sample
230329-g67nzsgf8y
-
MD5
ca001aafd820f9bfa17f8449f920ef6c
-
SHA1
bf11ec3800446dd070575a05a6eee335ca4102a6
-
SHA256
0553b17fec9602ac18d015f7f9278faedc2897e7d3d5000862ed73f26b741b0f
-
SHA512
7efa3e5e38158921a997370131988cce1addb11ede472a311a3ea9a724844994a98e5c5f12ecce51863ba36ff6696e0c5c0ceb9879eaf9948fa0f92ca94026da
-
SSDEEP
768:ryx8QibbbAtQjG3+K3ElKBEjfTRUXxSDoy7ZCoCIL5fBJfdfY:61
Static task
static1
Behavioral task
behavioral1
Sample
ORDER28033.xls.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ORDER28033.xls.vbs
Resource
win10v2004-20230220-en
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Targets
-
-
Target
ORDER28033.xls.vbs
-
Size
234KB
-
MD5
ca001aafd820f9bfa17f8449f920ef6c
-
SHA1
bf11ec3800446dd070575a05a6eee335ca4102a6
-
SHA256
0553b17fec9602ac18d015f7f9278faedc2897e7d3d5000862ed73f26b741b0f
-
SHA512
7efa3e5e38158921a997370131988cce1addb11ede472a311a3ea9a724844994a98e5c5f12ecce51863ba36ff6696e0c5c0ceb9879eaf9948fa0f92ca94026da
-
SSDEEP
768:ryx8QibbbAtQjG3+K3ElKBEjfTRUXxSDoy7ZCoCIL5fBJfdfY:61
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-