General
-
Target
ujcqhq.js
-
Size
222KB
-
Sample
240307-nv2rxsbd5y
-
MD5
28a74216e1c944f071b25958d81ec47c
-
SHA1
ae7013cf61337b4b7555c935a0113d08b50ffd00
-
SHA256
c6b1a76af1ca382029f3d9568863f82257518852812aeeca06da4b0afecdf100
-
SHA512
93ab441859afcd8594c64a7c65c0d4a0ca3e5a9a88c9347ebaa919853f0df9ca46be77638041b7107d311e9a670328ca8801e1f117d47d03c491a0e7b3cd770f
-
SSDEEP
6144:tpDxmeXigeXqd1LdkiOBvRafRHFPAeRnAklgF2GuuZD:T7d1LjOJcfdTtl029q
Behavioral task
behavioral1
Sample
ujcqhq.js
Resource
win7-20240221-es
Behavioral task
behavioral2
Sample
ujcqhq.js
Resource
win10-20240221-es
Behavioral task
behavioral3
Sample
ujcqhq.js
Resource
win10v2004-20240226-es
Malware Config
Targets
-
-
Target
ujcqhq.js
-
Size
222KB
-
MD5
28a74216e1c944f071b25958d81ec47c
-
SHA1
ae7013cf61337b4b7555c935a0113d08b50ffd00
-
SHA256
c6b1a76af1ca382029f3d9568863f82257518852812aeeca06da4b0afecdf100
-
SHA512
93ab441859afcd8594c64a7c65c0d4a0ca3e5a9a88c9347ebaa919853f0df9ca46be77638041b7107d311e9a670328ca8801e1f117d47d03c491a0e7b3cd770f
-
SSDEEP
6144:tpDxmeXigeXqd1LdkiOBvRafRHFPAeRnAklgF2GuuZD:T7d1LjOJcfdTtl029q
Score10/10-
WSHRAT payload
-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-