General
-
Target
38bd5894a8e1c294b4ea9f3809a1bb7d987af8db390063603c2fca96df2a77bf.zip
-
Size
159KB
-
Sample
231230-sqztzscec4
-
MD5
5e6b24b8800ba22c8c778bf6c06fdbad
-
SHA1
eb09a7033955cbd2517c45b2277f923f3dabf8ea
-
SHA256
795a5fad26bf022360bdb88d73d356037f0f644fd23c899f88547fa9552c6759
-
SHA512
e594884a2a85de3694f1f259cb39c3de89904df6a2c1552664d0f7bb479338784147bc68c620e646d87053d3fe26b6264f03f2ceb03e8fd3879743b7100230ee
-
SSDEEP
3072:X+tJI7T4fPxO7Aidy22laKxQ168C+Yeqz81VKulcBBjq4gkyqPpwGtY0utrs/:X2JI7c3QAky9xXWYeqI10ulm9nyqPCGX
Static task
static1
Behavioral task
behavioral1
Sample
38bd5894a8e1c294b4ea9f3809a1bb7d987af8db390063603c2fca96df2a77bf.vbs
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
38bd5894a8e1c294b4ea9f3809a1bb7d987af8db390063603c2fca96df2a77bf.vbs
Resource
win10v2004-20231215-en
Malware Config
Extracted
wshrat
http://poseidon99.duckdns.org:4758
Targets
-
-
Target
38bd5894a8e1c294b4ea9f3809a1bb7d987af8db390063603c2fca96df2a77bf.vbs
-
Size
254KB
-
MD5
bfb4e820b764be9c6ca3a7be5afdc124
-
SHA1
21e8d148050fa80830ee64cbf99d67292a21fabc
-
SHA256
38bd5894a8e1c294b4ea9f3809a1bb7d987af8db390063603c2fca96df2a77bf
-
SHA512
506a151144d5323156066d1a746bd3d9e14b99a170d1e89d9424a5a98dd05a794ab0aa32766b073f58ad866716ef25972b3a44a9d56fad80003c0abf13ced27f
-
SSDEEP
6144:ywKmqM4d6gb5mjTS8EoL36Uc2TEspbmWVX7FilDCtzQbxkGsg5:QdeTSWdI8mWVM+OGHs
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-