Behavioral task
behavioral1
Sample
invoice-wsl.js
Resource
win7-20230831-en
windows7-x64
21 signatures
150 seconds
Behavioral task
behavioral2
Sample
invoice-wsl.js
Resource
win10v2004-20230915-en
windows10-2004-x64
21 signatures
150 seconds
General
-
Target
m_Specifications-wsl.xz
-
Size
122KB
-
MD5
7d9f24061632d5e5cf29ec219448936d
-
SHA1
d6c5d8c13adc5abdb6512f89efafe595e5c45509
-
SHA256
6faebe3013cd3f48b7c2e3a2fdabb0a412ce18331a27457ec513058b51af9036
-
SHA512
f88159be554348419d6edd410702a8c99e578527d917b99650bd5732ca28eb10b10142323da03948e3a55dbcbae845b25560a57bafe88f18cf6301ee0d6efa1d
-
SSDEEP
3072:AQC+HuJ38ZKVsHAKlTKbOmefkPB2w8cY6TRvTDRx9nfe5H:A1+OKY2gWult2w8cY6TNDRI
Score
10/10
Malware Config
Signatures
-
WSHRAT payload 1 IoCs
resource yara_rule static1/unpack001/invoice-wsl.js family_wshrat -
Wshrat family
Files
-
m_Specifications-wsl.xz.rar
Password: infected
-
invoice-wsl.js.js