General
-
Target
proof of payment.js
-
Size
1.0MB
-
Sample
230403-pnx1tsef52
-
MD5
268465fb352ba7fcdc2962fa61ef4297
-
SHA1
7bf12c70c9f1a33dd3d4a1856dbb47b117747857
-
SHA256
5e1adbfff93bc6cb24e86022f3729ae05ed44fdf7057951117b87c7ff135aab3
-
SHA512
2d0b68fe6ee1c1079a8df6375d9d99c023a1b8526c394a9599be720aeab0d1ecd9617332b6f4cdd3342bdda3e79f3657a8cb92272522ddec805c51af2aa05fe4
-
SSDEEP
3072:MQI+0S8VOIWMXib7SWGbgLC+DWvBLwSwfoPp:MQoxJwQh
Static task
static1
Behavioral task
behavioral1
Sample
proof of payment.js
Resource
win7-20230220-en
Malware Config
Extracted
wshrat
http://harold.2waky.com:3609
Targets
-
-
Target
proof of payment.js
-
Size
1.0MB
-
MD5
268465fb352ba7fcdc2962fa61ef4297
-
SHA1
7bf12c70c9f1a33dd3d4a1856dbb47b117747857
-
SHA256
5e1adbfff93bc6cb24e86022f3729ae05ed44fdf7057951117b87c7ff135aab3
-
SHA512
2d0b68fe6ee1c1079a8df6375d9d99c023a1b8526c394a9599be720aeab0d1ecd9617332b6f4cdd3342bdda3e79f3657a8cb92272522ddec805c51af2aa05fe4
-
SSDEEP
3072:MQI+0S8VOIWMXib7SWGbgLC+DWvBLwSwfoPp:MQoxJwQh
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-