General
-
Target
9f0fc6d60f36df9301170a6ec0d3f408.bin
-
Size
213KB
-
Sample
230519-b868cadd4t
-
MD5
8ae52a6b68c864e27d5b34d712247892
-
SHA1
14cd5b20b3914f4e904b428cdff15167e663956d
-
SHA256
3a44e4d4ee6f0fd68a2df9704a0876dfa0496e3c77ba51b75052f465a00a8693
-
SHA512
5328935f14501f2f7240ac0650ea8a782c4738ce7328f5b827fee062ac7c3f704964b32ddeb0b777702801f098d18509aa25ac8abf13c9a361f9324136e81c4d
-
SSDEEP
6144:bnW/vAOIQSL1jLrbqiqPqomaC+uu//nVzICnn:K/I9PRbqiqiVx+pF8I
Static task
static1
Behavioral task
behavioral1
Sample
d295442674b1989fd65dea6a56081467424365f1c43ef9b74bff7fdb0f0c77ec.js
Resource
win7-20230220-en
Malware Config
Extracted
wshrat
http://harold.2waky.com:3609
Targets
-
-
Target
d295442674b1989fd65dea6a56081467424365f1c43ef9b74bff7fdb0f0c77ec.js
-
Size
990KB
-
MD5
9f0fc6d60f36df9301170a6ec0d3f408
-
SHA1
88ce1c32a1f7c18f34acf969e839ec4882e1428f
-
SHA256
d295442674b1989fd65dea6a56081467424365f1c43ef9b74bff7fdb0f0c77ec
-
SHA512
ddcd02d4b33bc0af4c5f4112ea7d00cef17dc56f0dd90ed8fb5ae0355ff7fb9c7a627f7f4f522954302abe27dee83dcb166f98735b5b49275810d017f2521293
-
SSDEEP
3072:QQIC0ry/lGgq1YRZILn3cl3hkdMnmxfHtnPr:QQIC0ry/lGgq1YR7y
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-