General
-
Target
7ff43ee5a3250008a6748ea0bdd5b6f654a84f5f766088279da1edb8b6c3c4c2
-
Size
238KB
-
Sample
230927-mj94gshh8y
-
MD5
426b84f219380e3025e96ed23ea70527
-
SHA1
8680a89ec622ab348dec019e36a6346d98a8f27a
-
SHA256
7ff43ee5a3250008a6748ea0bdd5b6f654a84f5f766088279da1edb8b6c3c4c2
-
SHA512
b37303b269ad2cd1a15daf4d7f3b7acda237031f118c37b29be03a514f7393b4c346b050c97cc3137c2d7214c8f96248996ee6817f68659ea06964537f808325
-
SSDEEP
6144:/j27WkdV8aVv50d3cw5RnraADy7A4YjiV5:7271dV8aY3cWRnGA+2w
Static task
static1
Behavioral task
behavioral1
Sample
03094991200.js
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
03094991200.js
Resource
win10v2004-20230915-en
Malware Config
Extracted
wshrat
http://198.37.105.223:7121
Targets
-
-
Target
03094991200.js
-
Size
1.1MB
-
MD5
c90e24e0496e0bb81d8032c74b7ed539
-
SHA1
b5e2df79729cb47c2401e932915fd05b8469decd
-
SHA256
a2dd5d94199f9b725b44f8dafedf9559d158f9fd0b9a445ef8b92383e445a32e
-
SHA512
c34a8d1a27e6a0c5e215f95cf4261aa173edb304c97d869fa73568b9e3eea0bf3886a867b268389a10fed1b8dea3b0c95898a71b99215a53b8e27669a616384f
-
SSDEEP
3072:IwALITZWIGnufMHbMJeA8PLBPWmPVJtT00YE:IwALITZWIGnufEWm9vTt
Score10/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-