General
-
Target
Tax Returns Of R48,765.js
-
Size
1018KB
-
Sample
230418-nq6v3sbb49
-
MD5
fcf6d37bdd93ae9930c6650c16d873db
-
SHA1
86eed10bfbfdd7f5f91ce3f2cc81342e9d349d18
-
SHA256
2c17399dcbac1772f3415387c3385d73aeb4ee3872bcd45c2b4ade63c35c5eef
-
SHA512
66b456b91e8195918b32e89f4aecb66a66d858f007f64fcdae866a48c7b199e5e64a93feda8917aa730bb188e1ff63636563d1dfe7c97438b98b2f3a2cbfa962
-
SSDEEP
6144:QQMrBMJwrxq9tec+fPE2Qfe7tcsOHRH+8ihlckYFv85dWVcwXLUM4e//7fJ3eYwa:TkeiM4SEq
Static task
static1
Behavioral task
behavioral1
Sample
Tax Returns Of R48,765.js
Resource
win7-20230220-en
Malware Config
Extracted
wshrat
http://harold.2waky.com:3609
Targets
-
-
Target
Tax Returns Of R48,765.js
-
Size
1018KB
-
MD5
fcf6d37bdd93ae9930c6650c16d873db
-
SHA1
86eed10bfbfdd7f5f91ce3f2cc81342e9d349d18
-
SHA256
2c17399dcbac1772f3415387c3385d73aeb4ee3872bcd45c2b4ade63c35c5eef
-
SHA512
66b456b91e8195918b32e89f4aecb66a66d858f007f64fcdae866a48c7b199e5e64a93feda8917aa730bb188e1ff63636563d1dfe7c97438b98b2f3a2cbfa962
-
SSDEEP
6144:QQMrBMJwrxq9tec+fPE2Qfe7tcsOHRH+8ihlckYFv85dWVcwXLUM4e//7fJ3eYwa:TkeiM4SEq
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-