General
-
Target
tmp
-
Size
396KB
-
Sample
230329-qyxy9aab5s
-
MD5
81f9f37ac3c2eedeb3469b055c4b8e96
-
SHA1
20d50098fcbff0e933c3f9fd42f82b22f741843b
-
SHA256
b17bdafe054295b84b35190c7021be09bb456095ba5702988048299e478a7284
-
SHA512
947df24f4f6b3aa38c47099f949c6ac383ac45d7dd40ac0b7b268b5191df8805a06b774f16188e3e1cb8e2c442d6cd22f10e3ddd074afb426e927f293bb65a5f
-
SSDEEP
12288:/YfkqbKDGNB+AzcBrQtV7ExskKQrftxpm4:/YfkqbKDGNB+M0KqsbQrzH
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
wshrat
http://snkcyp.duckdns.org:3369
Targets
-
-
Target
tmp
-
Size
396KB
-
MD5
81f9f37ac3c2eedeb3469b055c4b8e96
-
SHA1
20d50098fcbff0e933c3f9fd42f82b22f741843b
-
SHA256
b17bdafe054295b84b35190c7021be09bb456095ba5702988048299e478a7284
-
SHA512
947df24f4f6b3aa38c47099f949c6ac383ac45d7dd40ac0b7b268b5191df8805a06b774f16188e3e1cb8e2c442d6cd22f10e3ddd074afb426e927f293bb65a5f
-
SSDEEP
12288:/YfkqbKDGNB+AzcBrQtV7ExskKQrftxpm4:/YfkqbKDGNB+M0KqsbQrzH
Score10/10-
WSHRAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-