General
-
Target
ORDER_432023.pdf.xz
-
Size
7KB
-
Sample
230405-wsllxsaf9w
-
MD5
008e9c8eba08ed031c30fc10f805c369
-
SHA1
4a479570f970b73b82580276719d14a0f3f84be6
-
SHA256
812a24ac6164c88b6c931ec66339785e85dc0d1f10155c0dfc13353e43352cd5
-
SHA512
c5ade27d5d59dc6b7f4a3b3ba8da052771c9491e5c413ddeed50c3bfaec8af13ab27b7ffefe255a03cee6843dbeec7e5ef4b9cfc80d3c912fa1dc7dfddd67a65
-
SSDEEP
192:Z60eExX1KfXrznz5domBuvqN/YyzdErXyL8:40eEOf7H5KmLY8dErXyL8
Static task
static1
Behavioral task
behavioral1
Sample
ORDER_432023.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ORDER_432023.vbs
Resource
win10v2004-20230220-en
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Targets
-
-
Target
ORDER_432023.vbs
-
Size
218KB
-
MD5
6ecd1b4c44ebec3bb195abc6e0aeb1fc
-
SHA1
d09b365dc98d35e3e53e49503184f38aa9efd9b5
-
SHA256
9dfca9429d741fb4b39d97c4d48e4c542193cc68930faead1c77e74f9bf3678f
-
SHA512
8974df412ee71fa4a54a702038bbcf45fa53ad439f8c8dfde84e3b15857f99560fbca44fd101fb13e649b647e888cf0fd0945fd83389ffe0f6c75a424baa3b0a
-
SSDEEP
768:uYcgYP1Tsg0HlHsf6I7j3nS3ftCSrCURr4n+xPJOxkvsWssnZ1BWKsnCWKsnSRQz:Aj
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-