General
-
Target
shipment docs.js
-
Size
188KB
-
Sample
230517-swxa2see7z
-
MD5
f1a629154f159093b39b5f24c2413e5f
-
SHA1
1036b4213b6ca79a86e00fc5b752fba43e3e6ad6
-
SHA256
ac6fc6a98a2a3944477156cab221166f6ee535d1a9d91c66171914091af24d34
-
SHA512
180b7f8b8c27cf089788d2567eec7259799f0ee4abf141e82a6036708fd3c94d50870f3345bc7997af5c54eea7a7f994e61015db6ad50030dc3c95f17ee4bab6
-
SSDEEP
3072:9t+ZIeGK/6kbIpklgVDSxGfmuZcUZTbURC9qQ0bamCc8ovEztk:9wueGKlAklgF2GuuZcZRCfMAc84X
Behavioral task
behavioral1
Sample
shipment docs.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
shipment docs.js
Resource
win10v2004-20230221-en
Malware Config
Extracted
wshrat
http://wshh.ourhobby.com:2084
Targets
-
-
Target
shipment docs.js
-
Size
188KB
-
MD5
f1a629154f159093b39b5f24c2413e5f
-
SHA1
1036b4213b6ca79a86e00fc5b752fba43e3e6ad6
-
SHA256
ac6fc6a98a2a3944477156cab221166f6ee535d1a9d91c66171914091af24d34
-
SHA512
180b7f8b8c27cf089788d2567eec7259799f0ee4abf141e82a6036708fd3c94d50870f3345bc7997af5c54eea7a7f994e61015db6ad50030dc3c95f17ee4bab6
-
SSDEEP
3072:9t+ZIeGK/6kbIpklgVDSxGfmuZcUZTbURC9qQ0bamCc8ovEztk:9wueGKlAklgF2GuuZcZRCfMAc84X
Score10/10-
WSHRAT payload
-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-