General
-
Target
Purchase-Order-23726.vbs
-
Size
747KB
-
Sample
230726-l2sfqabc9y
-
MD5
c1782dd257f96535b081857cd64e2598
-
SHA1
dcfc5c3fe03e591bc9a6cfb7b008a312eedf343b
-
SHA256
47ef53bf5833e55b94c424f1a3560baf56bb672760e89fab43a0eb226720e265
-
SHA512
b39e5eee7a3e8d33ba01ca022bdd564a4ef0c6f00c40adebebec4ee8a310855859fcc1b6834d4361654630518989196e1f0e38160e7feac462a021f52cfe0840
-
SSDEEP
1536:/MRtSdp+jIiYowCm2soUPRQnrtIoA7OUzpZeVpnYCsHg6sgxstnZDQUhKKMp:8jNm2LnJIoA7OB/tsRWnZup
Static task
static1
Behavioral task
behavioral1
Sample
Purchase-Order-23726.vbs
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Purchase-Order-23726.vbs
Resource
win10v2004-20230703-en
Malware Config
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Targets
-
-
Target
Purchase-Order-23726.vbs
-
Size
747KB
-
MD5
c1782dd257f96535b081857cd64e2598
-
SHA1
dcfc5c3fe03e591bc9a6cfb7b008a312eedf343b
-
SHA256
47ef53bf5833e55b94c424f1a3560baf56bb672760e89fab43a0eb226720e265
-
SHA512
b39e5eee7a3e8d33ba01ca022bdd564a4ef0c6f00c40adebebec4ee8a310855859fcc1b6834d4361654630518989196e1f0e38160e7feac462a021f52cfe0840
-
SSDEEP
1536:/MRtSdp+jIiYowCm2soUPRQnrtIoA7OUzpZeVpnYCsHg6sgxstnZDQUhKKMp:8jNm2LnJIoA7OB/tsRWnZup
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-