General
-
Target
Order-POOPXDI23240044.js
-
Size
235KB
-
Sample
230616-ggamyscg9y
-
MD5
0a408696cd3ce383aca0ebd3f71ded39
-
SHA1
d9055c216f4d5324422d2aceb5b5f8e8940cd508
-
SHA256
fa304b07a41067eb15b646db4dd96d9be35e14684d20d7c74cc231b628212b53
-
SHA512
96ba0fcdf0544e41931a906e46733dac06f6f4930ee159c9193ee53faead256efb657f987e1e3c32047316ccf53e3de45fbd4371f4cef29df98923708cad85ec
-
SSDEEP
6144:voKqxDyKEDy41DShrQJYbMhERCGeGK3AklgF2GuuZde:Qo1DSqYyE8GKPl029se
Behavioral task
behavioral1
Sample
Order-POOPXDI23240044.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Order-POOPXDI23240044.js
Resource
win10v2004-20230220-en
Malware Config
Extracted
wshrat
http://habsidut.kozow.com:5303
Targets
-
-
Target
Order-POOPXDI23240044.js
-
Size
235KB
-
MD5
0a408696cd3ce383aca0ebd3f71ded39
-
SHA1
d9055c216f4d5324422d2aceb5b5f8e8940cd508
-
SHA256
fa304b07a41067eb15b646db4dd96d9be35e14684d20d7c74cc231b628212b53
-
SHA512
96ba0fcdf0544e41931a906e46733dac06f6f4930ee159c9193ee53faead256efb657f987e1e3c32047316ccf53e3de45fbd4371f4cef29df98923708cad85ec
-
SSDEEP
6144:voKqxDyKEDy41DShrQJYbMhERCGeGK3AklgF2GuuZde:Qo1DSqYyE8GKPl029se
Score10/10-
WSHRAT payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-