General
-
Target
Purchase_Order.zip
-
Size
17KB
-
Sample
230524-szd9msdf3w
-
MD5
1bef35cf12a2859bcd244bac90c4ffe7
-
SHA1
66a201eebfa893f0a550082173be0a45532ce624
-
SHA256
af225710834945af83a66163ffe1549d64c624d5d95f527fdd7eced708497fc4
-
SHA512
0e557acd68162585f83fa81ad6c7f64e4d03cc722f0222ba147d80b239f0ce80c2868de39118232fc049a6f4f2c6942aa0c75f5d07c98614a188e96026aadfaf
-
SSDEEP
384:OVw9OlmwwcsGhWgPhkCy+H5dlQWCVw2WDIUjMh40kN+V6Gb:OzlmwwccgO4dllC+2WDIUjMh40B6G
Static task
static1
Behavioral task
behavioral1
Sample
Purchase_Order.xls.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Purchase_Order.xls.vbs
Resource
win10v2004-20230220-en
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Targets
-
-
Target
Purchase_Order.xls.vbs
-
Size
527KB
-
MD5
8faf36edfae1ec0e8eccd3c562c03903
-
SHA1
0c44c3c6291c67c4eae6e1f8238f098adaee1a32
-
SHA256
1c546a6548beda639640ebfbb52abd5f6013c33500172cfccf0e8716c96bb196
-
SHA512
a54ea5e74c1320259b23d43e2eaadf83cf0705306df6dd1ba4bd4e9d77889d04449aa5161ad33165814a8b0f7baf41567537b721a048222f655216d1efdca56b
-
SSDEEP
384:Lu1hvWiWMmkNULg4viK3Ai44MXziJGUSJ0Pw6qVskjhj6Zxc6Xx0f3+hFx+gItIL:cvO
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-