General
-
Target
m_Specifications-wsl.xz
-
Size
122KB
-
Sample
231012-h4rqesdd9z
-
MD5
7d9f24061632d5e5cf29ec219448936d
-
SHA1
d6c5d8c13adc5abdb6512f89efafe595e5c45509
-
SHA256
6faebe3013cd3f48b7c2e3a2fdabb0a412ce18331a27457ec513058b51af9036
-
SHA512
f88159be554348419d6edd410702a8c99e578527d917b99650bd5732ca28eb10b10142323da03948e3a55dbcbae845b25560a57bafe88f18cf6301ee0d6efa1d
-
SSDEEP
3072:AQC+HuJ38ZKVsHAKlTKbOmefkPB2w8cY6TRvTDRx9nfe5H:A1+OKY2gWult2w8cY6TNDRI
Behavioral task
behavioral1
Sample
invoice-wsl.js
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
invoice-wsl.js
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
invoice-wsl.js
-
Size
187KB
-
MD5
bc0356063536ebe0867a97a1965a0f52
-
SHA1
f127953be621382ff50a37ebecef4d17bb3cd7d2
-
SHA256
197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5
-
SHA512
40f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565
-
SSDEEP
3072:2aeGK/6dbIpklgVDSxGfmuZRTFBTEsSQ0bamOZkvEzzbURC8:2aeGKgAklgF2GuuZ7auMTFRC8
Score10/10-
WSHRAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-