General
-
Target
a075c57c5e9ab478af53bbfa19faf2fecb404abd0d1ba953e84d347d5093f906
-
Size
2.0MB
-
Sample
230926-r2gl4sac7s
-
MD5
a0524f23d52b8b507d75b088c7eae822
-
SHA1
f630da68a905385ad8178df8b00964acda381505
-
SHA256
8506e666c372ca8121a6919a63f06846894a32c5ea3ab4b2fd73fbb631fe991e
-
SHA512
53c4ba53293a0a4a9069d46009ab65d3256e82c6e8c4e896254699fc54eb001982a36256d5c13c3279ffc930535b3bc13fcb079f468fd74e4a59dbd59bfadb7b
-
SSDEEP
49152:k4f5KB1PGELs953r91/yLGUc3Gb9OdpbDQ6dKRd3mL4o1gT2vEegZ:jf5+c11t8wc6gR9M4LT2vvgZ
Static task
static1
Behavioral task
behavioral1
Sample
a075c57c5e9ab478af53bbfa19faf2fecb404abd0d1ba953e84d347d5093f906.exe
Resource
win7-20230831-en
Malware Config
Extracted
wshrat
http://80.76.51.33:2606
Targets
-
-
Target
a075c57c5e9ab478af53bbfa19faf2fecb404abd0d1ba953e84d347d5093f906
-
Size
2.1MB
-
MD5
066dbf69cbfa16c46a2142a257c95f1d
-
SHA1
0300eb287c3e29642877772c348c6b683b86a305
-
SHA256
a075c57c5e9ab478af53bbfa19faf2fecb404abd0d1ba953e84d347d5093f906
-
SHA512
c1874bf3d3c6c56168eec1b18242af7562696e9c556ab7612b4c592b78b76286ce80a44cd55222df39f4e85e27cdf19b084dfd0a24127a73615f04545925da7a
-
SSDEEP
49152:wkQTArh5KH1JME1y9fb95r/6LGoc30b9KJp9D06dkRNLkL+mrcTuZqy:warh5s41rL6WY6SRpO+dTuZP
-
WSHRAT payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-