General
-
Target
587dbf7f25e6078a552505be43c9013c5be3ce454ecc5c64edd5a3598325aebf
-
Size
449KB
-
Sample
230408-hvsw5aec2w
-
MD5
24970aab6d2f2388a1bb986fbc16f56b
-
SHA1
847986dce6acc5da7c5bab853ab9317035114024
-
SHA256
587dbf7f25e6078a552505be43c9013c5be3ce454ecc5c64edd5a3598325aebf
-
SHA512
85bd00115e4097e4d880c5946a7766f34470a3c822b31e8688ce850b5ad2cd05a9234df78f282799cfdba148689417bf46e8aa1f3af18c3f9a950590ca4834b3
-
SSDEEP
12288:vYxDYzoG3JGoShnxu5uwo3HzZkniGBZwzm0CK2F:vYxd4S9xufezZhGBZwzm9P
Static task
static1
Behavioral task
behavioral1
Sample
587dbf7f25e6078a552505be43c9013c5be3ce454ecc5c64edd5a3598325aebf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
587dbf7f25e6078a552505be43c9013c5be3ce454ecc5c64edd5a3598325aebf.exe
Resource
win10v2004-20230221-en
Malware Config
Targets
-
-
Target
587dbf7f25e6078a552505be43c9013c5be3ce454ecc5c64edd5a3598325aebf
-
Size
449KB
-
MD5
24970aab6d2f2388a1bb986fbc16f56b
-
SHA1
847986dce6acc5da7c5bab853ab9317035114024
-
SHA256
587dbf7f25e6078a552505be43c9013c5be3ce454ecc5c64edd5a3598325aebf
-
SHA512
85bd00115e4097e4d880c5946a7766f34470a3c822b31e8688ce850b5ad2cd05a9234df78f282799cfdba148689417bf46e8aa1f3af18c3f9a950590ca4834b3
-
SSDEEP
12288:vYxDYzoG3JGoShnxu5uwo3HzZkniGBZwzm0CK2F:vYxd4S9xufezZhGBZwzm9P
Score10/10-
WSHRAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-