General
-
Target
8e53746797bbecbef642259c5403297f4d3fa0bd1b4e6e3cd637011027e5ebc8
-
Size
1.9MB
-
Sample
231011-zkf81scf4y
-
MD5
af22e48d98420836fd37c916428f3294
-
SHA1
84b90d52157094799812b08087294e674b10b082
-
SHA256
8e53746797bbecbef642259c5403297f4d3fa0bd1b4e6e3cd637011027e5ebc8
-
SHA512
1575508adaf49dfc00bc65079583284d15b2971f9153fdc4ea94f5b1150449794390db1e02b222d7a6a1f63c3335f74385da22668e0ec596bf0520ed1fbebbb5
-
SSDEEP
49152:FTfq9T3HTultPtuceoswmWj4wLCc3jWicxv:dfq9T3CltGRhQV3
Static task
static1
Behavioral task
behavioral1
Sample
8e53746797bbecbef642259c5403297f4d3fa0bd1b4e6e3cd637011027e5ebc8.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
8e53746797bbecbef642259c5403297f4d3fa0bd1b4e6e3cd637011027e5ebc8
-
Size
1.9MB
-
MD5
af22e48d98420836fd37c916428f3294
-
SHA1
84b90d52157094799812b08087294e674b10b082
-
SHA256
8e53746797bbecbef642259c5403297f4d3fa0bd1b4e6e3cd637011027e5ebc8
-
SHA512
1575508adaf49dfc00bc65079583284d15b2971f9153fdc4ea94f5b1150449794390db1e02b222d7a6a1f63c3335f74385da22668e0ec596bf0520ed1fbebbb5
-
SSDEEP
49152:FTfq9T3HTultPtuceoswmWj4wLCc3jWicxv:dfq9T3CltGRhQV3
-
WSHRAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-