General
-
Target
36c7ea69a51fdcb7eb3b66eafbbcf516.bin
-
Size
122KB
-
Sample
230524-bgezsaab75
-
MD5
2fa43e611563355c3a3171e202f7fba8
-
SHA1
5e21d31e38eba36c1b2a07bb60204be567a69091
-
SHA256
246e8fe7a99ace6d57abbd8f66e1bced65f68cd81f08f7229b478b2ef7b38274
-
SHA512
07e791e519630750e03c4e47e0ac88b4caae13356cca02f9fecc69016a12745d1a89d38f6f60e11c6b57b18426659a3acdf46fbd94cb590a8d959d709bbbcd7a
-
SSDEEP
3072:nFVLdWz+Y1STkm3vs5/5S/CkGEQ1YNzokIdhC77itxtr:FVktoYEa/WCDvwMkiBN
Behavioral task
behavioral1
Sample
5684eaf9be940a6d7c5a559182c8d54b46151de46c72b60bf1c1112e2aeb9e4b.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5684eaf9be940a6d7c5a559182c8d54b46151de46c72b60bf1c1112e2aeb9e4b.js
Resource
win10v2004-20230220-en
Malware Config
Extracted
wshrat
http://wshh.ourhobby.com:2084
Targets
-
-
Target
5684eaf9be940a6d7c5a559182c8d54b46151de46c72b60bf1c1112e2aeb9e4b.js
-
Size
187KB
-
MD5
36c7ea69a51fdcb7eb3b66eafbbcf516
-
SHA1
8a81452869a67d8abfe5f2165b3475286274139e
-
SHA256
5684eaf9be940a6d7c5a559182c8d54b46151de46c72b60bf1c1112e2aeb9e4b
-
SHA512
2c99f20c1b4c2796501c03ea78d6704efab1fda7e4356d35797e1ac853dd7b0cff6378d6af5250f65daa855bb46591d5902b6cab3332501c24faba018c7ac4f3
-
SSDEEP
3072:nrVZAmAl1luVkQS7bURCwbIpklgVDSxGfmuZrvEzs8ZPr+eGK/68Q0bamqg:rVZAmAl1luVkQS8RCuAklgF2GuuZTXe7
Score10/10-
WSHRAT payload
-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-