General
-
Target
Proof of payment.js
-
Size
1.1MB
-
Sample
230419-tmdysadf7t
-
MD5
07948d4c14243ac4b4eaf9a0230ec5b5
-
SHA1
185fb7dd9090676f5ad5f25273a7995ca2b9c1a1
-
SHA256
b10629b039634989764ba8d45aaa4ea06482e770d2ad9ee436d4fe0d4eff9144
-
SHA512
c1e00563bf710d3e5a516c9a72968a35096d2c6b8571f341e4639bf3b0a0a85bb4f5c102a39c7daf9c4cd366bcb820b4ddcd3413e75c4a11a6972a0862ce0cf6
-
SSDEEP
3072:QQToJ8BgSQIp0Ptzlk69MkT3QvWEYye6mTKAl:QQTstMkT6ed
Static task
static1
Behavioral task
behavioral1
Sample
Proof of payment.js
Resource
win7-20230220-en
Malware Config
Extracted
wshrat
http://harold.2waky.com:1604
Targets
-
-
Target
Proof of payment.js
-
Size
1.1MB
-
MD5
07948d4c14243ac4b4eaf9a0230ec5b5
-
SHA1
185fb7dd9090676f5ad5f25273a7995ca2b9c1a1
-
SHA256
b10629b039634989764ba8d45aaa4ea06482e770d2ad9ee436d4fe0d4eff9144
-
SHA512
c1e00563bf710d3e5a516c9a72968a35096d2c6b8571f341e4639bf3b0a0a85bb4f5c102a39c7daf9c4cd366bcb820b4ddcd3413e75c4a11a6972a0862ce0cf6
-
SSDEEP
3072:QQToJ8BgSQIp0Ptzlk69MkT3QvWEYye6mTKAl:QQTstMkT6ed
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-