General
-
Target
Request For Quotation.js
-
Size
1.2MB
-
Sample
230516-jzd47sbh65
-
MD5
dca76785db3828884851b229738392e2
-
SHA1
d7687fe5780970e04849d142f7889391be73ed99
-
SHA256
1254fb84cd8e21d3c712881f606cd36e8d068ad89b205da335614696bfc59ca3
-
SHA512
30399033982b81aea21cab8c44739b053bb603c8b516e01ce1a1c6396004fd998dd01798d184259151de5217df9afc2b85e5ef2fa9711e6ec31f66a44ef2ab9c
-
SSDEEP
1536:QQ12UuLTs1CdS1nOsMokKleE73rnroY1YDEvMKfQXr6rsqTorsqTPs8Csn98uXOY:QQvo9S7xNJ0iIhQG9T
Static task
static1
Behavioral task
behavioral1
Sample
Request For Quotation.js
Resource
win7-20230220-en
Malware Config
Extracted
wshrat
http://harold.2waky.com:3609
Targets
-
-
Target
Request For Quotation.js
-
Size
1.2MB
-
MD5
dca76785db3828884851b229738392e2
-
SHA1
d7687fe5780970e04849d142f7889391be73ed99
-
SHA256
1254fb84cd8e21d3c712881f606cd36e8d068ad89b205da335614696bfc59ca3
-
SHA512
30399033982b81aea21cab8c44739b053bb603c8b516e01ce1a1c6396004fd998dd01798d184259151de5217df9afc2b85e5ef2fa9711e6ec31f66a44ef2ab9c
-
SSDEEP
1536:QQ12UuLTs1CdS1nOsMokKleE73rnroY1YDEvMKfQXr6rsqTorsqTPs8Csn98uXOY:QQvo9S7xNJ0iIhQG9T
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-