General
-
Target
neworder.js
-
Size
3.1MB
-
Sample
230926-cx37zseh86
-
MD5
cf54d832051744f8a17d8883bb0d7579
-
SHA1
8996b0ea7579eefdc5b143d8e71e00fbabef2749
-
SHA256
c98083c89ba696fdc10a9528722e8673f70b0b1872b52fbda472a38d4cfbf350
-
SHA512
9918d08bdbcec5213e30cc732dbd0705bcc3a7db08090ae8366a57c9cbbb87296861c75eafb6f239deba92711d7cbacd482f2a25dea0ef96545fe00ae0cb40b6
-
SSDEEP
768:aBLsno5sVaEb33OSp4//6AtsaaiIWVibo1WFti/KaqQh:aBLso5sVaEb3+SAtsaaiBwU1WFyKnO
Static task
static1
Behavioral task
behavioral1
Sample
neworder.js
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
neworder.js
Resource
win10v2004-20230915-en
Malware Config
Extracted
wshrat
http://akinbo.ddns.net:6380
Targets
-
-
Target
neworder.js
-
Size
3.1MB
-
MD5
cf54d832051744f8a17d8883bb0d7579
-
SHA1
8996b0ea7579eefdc5b143d8e71e00fbabef2749
-
SHA256
c98083c89ba696fdc10a9528722e8673f70b0b1872b52fbda472a38d4cfbf350
-
SHA512
9918d08bdbcec5213e30cc732dbd0705bcc3a7db08090ae8366a57c9cbbb87296861c75eafb6f239deba92711d7cbacd482f2a25dea0ef96545fe00ae0cb40b6
-
SSDEEP
768:aBLsno5sVaEb33OSp4//6AtsaaiIWVibo1WFti/KaqQh:aBLso5sVaEb3+SAtsaaiBwU1WFyKnO
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-