General
-
Target
Purcahse_Order.vbs
-
Size
230KB
-
Sample
230409-hzc2gabe9t
-
MD5
dfaa0731635b4e0867fb1a5b00f97cd4
-
SHA1
0c0723a3447aa571afb33db576421a4af2dc8b86
-
SHA256
01313c486b99a572a9dbcbc3e01d414f11624d4e9b813a825f962b5ce66fcf64
-
SHA512
093af630e4ef2ad24ebfc088af53e5f6b6c9c88f51b6075aace72d9ce4a1de89d6825ace40eb23d7ae6c22900d1e6db04aee1544be4a701ed0c3980109fb326c
-
SSDEEP
768:HxeMsGDC5m7QRcs7Gbs9GNjfN4Jxw9qOlFOeO2rlznJfjc:2J
Static task
static1
Behavioral task
behavioral1
Sample
Purcahse_Order.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Purcahse_Order.vbs
Resource
win10v2004-20230220-en
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Targets
-
-
Target
Purcahse_Order.vbs
-
Size
230KB
-
MD5
dfaa0731635b4e0867fb1a5b00f97cd4
-
SHA1
0c0723a3447aa571afb33db576421a4af2dc8b86
-
SHA256
01313c486b99a572a9dbcbc3e01d414f11624d4e9b813a825f962b5ce66fcf64
-
SHA512
093af630e4ef2ad24ebfc088af53e5f6b6c9c88f51b6075aace72d9ce4a1de89d6825ace40eb23d7ae6c22900d1e6db04aee1544be4a701ed0c3980109fb326c
-
SSDEEP
768:HxeMsGDC5m7QRcs7Gbs9GNjfN4Jxw9qOlFOeO2rlznJfjc:2J
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-