General
-
Target
a075c57c5e9ab478af53bbfa19faf2fecb404abd0d1ba953e84d347d5093f906_JC.exe
-
Size
2.1MB
-
Sample
230930-qdxsracd5v
-
MD5
066dbf69cbfa16c46a2142a257c95f1d
-
SHA1
0300eb287c3e29642877772c348c6b683b86a305
-
SHA256
a075c57c5e9ab478af53bbfa19faf2fecb404abd0d1ba953e84d347d5093f906
-
SHA512
c1874bf3d3c6c56168eec1b18242af7562696e9c556ab7612b4c592b78b76286ce80a44cd55222df39f4e85e27cdf19b084dfd0a24127a73615f04545925da7a
-
SSDEEP
49152:wkQTArh5KH1JME1y9fb95r/6LGoc30b9KJp9D06dkRNLkL+mrcTuZqy:warh5s41rL6WY6SRpO+dTuZP
Static task
static1
Behavioral task
behavioral1
Sample
a075c57c5e9ab478af53bbfa19faf2fecb404abd0d1ba953e84d347d5093f906_JC.exe
Resource
win7-20230831-en
Malware Config
Extracted
wshrat
http://80.76.51.33:2606
Targets
-
-
Target
a075c57c5e9ab478af53bbfa19faf2fecb404abd0d1ba953e84d347d5093f906_JC.exe
-
Size
2.1MB
-
MD5
066dbf69cbfa16c46a2142a257c95f1d
-
SHA1
0300eb287c3e29642877772c348c6b683b86a305
-
SHA256
a075c57c5e9ab478af53bbfa19faf2fecb404abd0d1ba953e84d347d5093f906
-
SHA512
c1874bf3d3c6c56168eec1b18242af7562696e9c556ab7612b4c592b78b76286ce80a44cd55222df39f4e85e27cdf19b084dfd0a24127a73615f04545925da7a
-
SSDEEP
49152:wkQTArh5KH1JME1y9fb95r/6LGoc30b9KJp9D06dkRNLkL+mrcTuZqy:warh5s41rL6WY6SRpO+dTuZP
-
WSHRAT payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-