General
-
Target
Invoice.zip
-
Size
4KB
-
Sample
231012-17qlmsfa75
-
MD5
7dfc01a2a03952a3afb4b70d630af840
-
SHA1
8164f6fa2bd1ef5ef7784b5a09a365c572442e1f
-
SHA256
aeffda62334eb8d5894291f07cf341da0733bd616f20e7e85d0b665f19ae6895
-
SHA512
99a24f150fbf3f7e3d146d1dcb1c179794d02546c11f6d69174d15ba11f4affa9c17091f4d9b4bfee456d0b5e2f3ab4d64afc113966d5b14b375a2e4c473ec62
-
SSDEEP
96:5TQ5wqRsIowVVB3jXInvAZbPegpqeA18psNDVDavQuUdeWfziy:5TQ5Q8paYZPqeAbbm5UdeMey
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.js
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Invoice.js
Resource
win10v2004-20230915-en
Malware Config
Extracted
wshrat
http://wishpeople.duckdns.org:9071
Targets
-
-
Target
Invoice.js
-
Size
21KB
-
MD5
12b2471d3c8dd16efd69ab5aca0678b9
-
SHA1
15dca12d5e2d7d0281990ee43ffbcd22396fe01a
-
SHA256
ae69570258cabd6bbede57ef510836d167c0d9b1752d3d742f8e4769e17eba15
-
SHA512
7f72edfe2fa615279bfb18a6117afdac855ea6c37250b2473dad2f9ee6d701869123240f44d631020b4fb727869d00a697de5ed7c7bd59640594b57a4db787ac
-
SSDEEP
384:6/+tc8v+YhrKZKZXeX5U7CP9fD0eX5GrnB63vQOaSDsvkysjqFJ8TatW8TaUxTam:6/+tbv+YhdZXeXic9fD0eXknB6Y6Dsv7
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-