General
-
Target
dfaa0731635b4e0867fb1a5b00f97cd4.bin
-
Size
8KB
-
Sample
230411-b5nxlabd4v
-
MD5
be5ff0c876d8128c586785af42db75b6
-
SHA1
d064ccf5c1edc9b270569cdd77833e6e37a855cf
-
SHA256
51fe490b18d7e136824a8eac22f4812e248b43cfa7eb9d594eee5ba8873c186c
-
SHA512
390d0dc6af84a9a2101b78e80acb76aa7e464db144184da02032da5a73a620c2c23bf96f489732ec89f98977cf064c9b9661bb1a457514dad0ef834d1a100c77
-
SSDEEP
192:4N7x4Qj6+W/lBUxFFMy40tlHUoroHjSo2RNWkWDBG/+5Xj+PIJ9s51Dj+7:Y7xL6D/6g0tlHUAoHGnmQgJ9qDu
Static task
static1
Behavioral task
behavioral1
Sample
01313c486b99a572a9dbcbc3e01d414f11624d4e9b813a825f962b5ce66fcf64.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
01313c486b99a572a9dbcbc3e01d414f11624d4e9b813a825f962b5ce66fcf64.vbs
Resource
win10v2004-20230220-en
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Targets
-
-
Target
01313c486b99a572a9dbcbc3e01d414f11624d4e9b813a825f962b5ce66fcf64.vbs
-
Size
230KB
-
MD5
dfaa0731635b4e0867fb1a5b00f97cd4
-
SHA1
0c0723a3447aa571afb33db576421a4af2dc8b86
-
SHA256
01313c486b99a572a9dbcbc3e01d414f11624d4e9b813a825f962b5ce66fcf64
-
SHA512
093af630e4ef2ad24ebfc088af53e5f6b6c9c88f51b6075aace72d9ce4a1de89d6825ace40eb23d7ae6c22900d1e6db04aee1544be4a701ed0c3980109fb326c
-
SSDEEP
768:HxeMsGDC5m7QRcs7Gbs9GNjfN4Jxw9qOlFOeO2rlznJfjc:2J
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-