General
-
Target
8B6A61F9E22244F006E883033CB69DA1BDF6245B60FECFEFF27A8D3B60F57CC3
-
Size
7KB
-
Sample
230518-cfyk6sgc9v
-
MD5
00657052ad9cdcb9ca9f4c3ea9a10c5f
-
SHA1
2f849694aee29cc1e45e21b6b90a09f179d14697
-
SHA256
8b6a61f9e22244f006e883033cb69da1bdf6245b60fecfeff27a8d3b60f57cc3
-
SHA512
294a65f515cbdebf769ffcf19857056c2344116ef19686e1153ab7270b2cbbd8176fa57600f52c4d734bb6f2135aad479a75f38e53ee3cfbd257125c79b8114b
-
SSDEEP
192:HMev2rk+4aIBS/jKGZ4D81cbPua2QeEJhpinaKyRGtlcaQr:Ht2cRA7KGtcLuk7hpinfQSP0
Static task
static1
Behavioral task
behavioral1
Sample
ORDER_230322.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ORDER_230322.vbs
Resource
win10v2004-20230220-en
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Targets
-
-
Target
ORDER_230322.vbs
-
Size
250KB
-
MD5
2a76503660d140d0aa08bd758cb9c29c
-
SHA1
55c1ba23321e11c0298450fb9dfa1ccebdea2d86
-
SHA256
5f0329e51f347ca573ea69cd865bb03d0526d9e9e91477a4502a9fe35c3fbddf
-
SHA512
f50da5213bf53b02199a2d3c5c8d06643315bd939b5047bfe44a904b8cb45be22793155f9055e9529c3ebd1861d14ae39528a9914e841ab3a91c6540c29b7390
-
SSDEEP
768:19C8cPTeUGV5V4ky1rHHPskYROOowLXMJuzHHMH+HCo/LiGi2tl33xRXC:yR
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-