General
-
Target
fc71f33de4f4f7c693135b16c7c67fe6.bin
-
Size
8KB
-
Sample
230411-b9hldahh35
-
MD5
921b985ffbe124ad26b6ddf029e7e38e
-
SHA1
d780dae45a7672fc7c14301dabc03b208ded755f
-
SHA256
30d07a517dd533db174117c6d59cc0931ba9c4e413984906a6f1ac644850482a
-
SHA512
f9d0928fd1f66e8f2925436a3ad1628e7c95a2756d7c96c07bf08ed670d81635ced9c8de3730cc902dde2116f537a5b6b1c0361a064c0e2efec37ef1b28a6fed
-
SSDEEP
192:lzI8BEU+uRX/ttpYIRoB+N98zFGQ7dzWhhtqscArpWbNRSIY:lzI8uFuRX/zWoNv8zFX7dgFFWBY
Static task
static1
Behavioral task
behavioral1
Sample
Purchase_Order.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Purchase_Order.vbs
Resource
win10v2004-20230220-en
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Targets
-
-
Target
Purchase_Order.vbs
-
Size
260KB
-
MD5
2ff3bce5c3e24a9a66ed42b49c3da68d
-
SHA1
ca5506d9d30e0690d3cc023fafd524e09145ae83
-
SHA256
7287f5e59370b51b2fa62b837ef11e5b7c37703151227c2fee01feaf04836fce
-
SHA512
675956065410bc169900d5b2f7e5cc93c3499c222e3bb4cf83a578413a66fb9fdc0dad3f0af2a8fcefddcf178d6709f8e6efedea8a4bd6e25337026172706b85
-
SSDEEP
768:Uwh+I+2b4WelZTvQYeXbxbYvEl2C9v0s0kdj57L3bK:Uwq7
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-