General
-
Target
bc0078eddf96041937071aa21a514385275768fd1efef78196c73df4efd76b6d_JC.img
-
Size
1.2MB
-
Sample
231012-pcn9jsbe85
-
MD5
717e2c453cda45641f4be6ec62918bb1
-
SHA1
83a599cfc0d7de4c978142c5d02187293fdb592d
-
SHA256
bc0078eddf96041937071aa21a514385275768fd1efef78196c73df4efd76b6d
-
SHA512
350ede154f652fb4dfd29cde971d531ccee06882bd3dd3c03e92e09fa6d3dc4fbdf0a5b632d264eaf1646c20942ddff5cee8f1c26d226b90346e109439efda14
-
SSDEEP
192:aBzfWlv0pHLdF1bvM+A4tLHwpTxHR95w0J1dZdckF+syKtieOv:OG+Lxbk+A4tTyFSvsyuDO
Static task
static1
Behavioral task
behavioral1
Sample
14080220.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
14080220.EXE
-
Size
12KB
-
MD5
1eef9f1c50a5362d4ff555b6cc5bc5df
-
SHA1
caa4099e942052634cea6fc2866d9652f09cf546
-
SHA256
420a2c200fde9d62bc040616edd62949aec77d6e39bf864602f584792fc8e867
-
SHA512
56c41cf987ba22ddac2cac9ef10e3dbadf2abd99ca0ed3510883d532cc5d1625ce50426308b8e91bd20645e3812074b31b977976646d751621dd18a92b877218
-
SSDEEP
192:nlv0pHLdF1bvM+A4tLHwpTxHR95w0J1dZdckF+syKtieOv:d+Lxbk+A4tTyFSvsyuDO
-
WSHRAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-