General
-
Target
315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d.zip
-
Size
9KB
-
Sample
230502-y8y83aeb9t
-
MD5
b4922ac7c48e92e0e02f997c9a171ff1
-
SHA1
28e9ad620500023e3b40c72273433637a6ede16a
-
SHA256
48b52babdbbc6826bdf0824b0025bb726d9c94441eaa31cdc2fa421f861deedb
-
SHA512
41c52699d40cce8e6d1ea77d3f4275056214f9479668fce25d8be78d07b8d9153cb34acf0d6d62a60ff4e17ffc8171149b8cb37e064c43f5ef4fccbdd2573040
-
SSDEEP
192:+PzO2KM4zMGJPRS9M5PZoAKGTUEiXqcZNRDcjJTRsXTv:+wzzMBEhoAKG0qILD2GXTv
Static task
static1
Behavioral task
behavioral1
Sample
315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d.vbs
Resource
win10v2004-20230220-en
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Targets
-
-
Target
315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d.vbs
-
Size
289KB
-
MD5
ba07223a894931526fd69b0c2b21221d
-
SHA1
d7b63bb26abca39ef9c5ececa1a7bee5aa68cd15
-
SHA256
315061606e655e66db6ed9fa5bcbbac33e645c36da0a5730717973b8e323eb0d
-
SHA512
49611e025ccaa2f79072b3a1ab53b7d3fce2c61602ab6dc03dcf2fe9af862bdcdc35c9a3475c8a89ce99cadc89c20495730c048bd23248d644dee54b9a252799
-
SSDEEP
384:d7QL+L0YoyzODjxosdoKF5vT8b8Qq6Pu7r7eOFDl7k7EDFh+2O0i99RVz8Jm0Jp1:4
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-