General
-
Target
proof of payment.js
-
Size
889KB
-
Sample
230401-h9jl1aaa7y
-
MD5
efc5acb3aca2cf5fbeb9a84cfeead4ea
-
SHA1
268e8aac48146555279c8464348f7715f360f81b
-
SHA256
1df7fbf9fa17d2a0d1842835081786741b976a2a20fde19aabbe4f34af62df07
-
SHA512
1a3a8d2dee581d6126303f6c11286c354b5d46efc37cac20eaf2f288aa72f5a9f71f71ccabca826fe29a9ce07cce2a87b22435442f3547b4f5841b5fd79c16fa
-
SSDEEP
6144:GQpGhV3Cbp8Ka7UqqaaRyHIQwkKaq2iuh8Qy04sBGi+oIdzdya6R/EHHKgk/kZjJ:NchO
Static task
static1
Behavioral task
behavioral1
Sample
proof of payment.js
Resource
win7-20230220-en
Malware Config
Extracted
wshrat
http://harold.2waky.com:1604
Targets
-
-
Target
proof of payment.js
-
Size
889KB
-
MD5
efc5acb3aca2cf5fbeb9a84cfeead4ea
-
SHA1
268e8aac48146555279c8464348f7715f360f81b
-
SHA256
1df7fbf9fa17d2a0d1842835081786741b976a2a20fde19aabbe4f34af62df07
-
SHA512
1a3a8d2dee581d6126303f6c11286c354b5d46efc37cac20eaf2f288aa72f5a9f71f71ccabca826fe29a9ce07cce2a87b22435442f3547b4f5841b5fd79c16fa
-
SSDEEP
6144:GQpGhV3Cbp8Ka7UqqaaRyHIQwkKaq2iuh8Qy04sBGi+oIdzdya6R/EHHKgk/kZjJ:NchO
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-