General
-
Target
717e2c453cda45641f4be6ec62918bb1.bin
-
Size
9KB
-
Sample
231012-m8l3yseh4x
-
MD5
1e9f2513d0b5dba64cfd2702def44c0f
-
SHA1
e85afe011d324487b752da6d7ff9b1f53c624bd1
-
SHA256
1bec3a58c2c83370601a6bca6b33ca90213d3613e03c0dce65e8a28997092ddc
-
SHA512
a0dec8d9387c8ad57b1ea65a21b7b1343c168789d5ccb4badd1a7dd578010e3e8b3ecdba49db52c020146c12216396952c1ffa3c13a1ec8f4b916463f2ee9895
-
SSDEEP
192:wizfrvqyGzSwTJ+ZXNqu4lY+RxsNs6GNG0voQ6R9esF1G0e6JjNDVkpfO74yV:wizDvqyG+SaMblHGC6Wvor9esW0e65Nd
Static task
static1
Behavioral task
behavioral1
Sample
140802200220531MES_S Quote.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
140802200220531MES_S Quote.exe
-
Size
12KB
-
MD5
1eef9f1c50a5362d4ff555b6cc5bc5df
-
SHA1
caa4099e942052634cea6fc2866d9652f09cf546
-
SHA256
420a2c200fde9d62bc040616edd62949aec77d6e39bf864602f584792fc8e867
-
SHA512
56c41cf987ba22ddac2cac9ef10e3dbadf2abd99ca0ed3510883d532cc5d1625ce50426308b8e91bd20645e3812074b31b977976646d751621dd18a92b877218
-
SSDEEP
192:nlv0pHLdF1bvM+A4tLHwpTxHR95w0J1dZdckF+syKtieOv:d+Lxbk+A4tTyFSvsyuDO
-
WSHRAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-