General
-
Target
invoice-wsl.js
-
Size
187KB
-
Sample
230923-jx9s4adh6z
-
MD5
bc0356063536ebe0867a97a1965a0f52
-
SHA1
f127953be621382ff50a37ebecef4d17bb3cd7d2
-
SHA256
197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5
-
SHA512
40f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565
-
SSDEEP
3072:2aeGK/6dbIpklgVDSxGfmuZRTFBTEsSQ0bamOZkvEzzbURC8:2aeGKgAklgF2GuuZ7auMTFRC8
Behavioral task
behavioral1
Sample
invoice-wsl.js
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
invoice-wsl.js
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
invoice-wsl.js
-
Size
187KB
-
MD5
bc0356063536ebe0867a97a1965a0f52
-
SHA1
f127953be621382ff50a37ebecef4d17bb3cd7d2
-
SHA256
197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5
-
SHA512
40f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565
-
SSDEEP
3072:2aeGK/6dbIpklgVDSxGfmuZRTFBTEsSQ0bamOZkvEzzbURC8:2aeGKgAklgF2GuuZ7auMTFRC8
Score10/10-
WSHRAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-