General
-
Target
invoice.vbs
-
Size
19KB
-
Sample
240323-xjzmvsde2y
-
MD5
433febbbc8e5d0eeed7b3aaa9ad15558
-
SHA1
83905f45e2c6977f35e7db522052295d739fd667
-
SHA256
25b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e
-
SHA512
6cae2f6e7b86052af6f812e815128f67ce76f44e56b9bfdb5e4fa0ce2fba5610deb830334162b330e5e494bece380d1f7e053f6f89eac398d48fe49cbb3626ec
-
SSDEEP
384:vKNssJiGagRYwZSFFOECXCghDStXdTX2XXXiXs31TNWE/cJ1:vq9agRYwZSGECXCgM7rGHqc1IE/m
Static task
static1
Behavioral task
behavioral1
Sample
invoice.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
invoice.vbs
Resource
win10v2004-20240226-en
Malware Config
Extracted
wshrat
http://paulrdp02.duckdns.org:1604
Targets
-
-
Target
invoice.vbs
-
Size
19KB
-
MD5
433febbbc8e5d0eeed7b3aaa9ad15558
-
SHA1
83905f45e2c6977f35e7db522052295d739fd667
-
SHA256
25b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e
-
SHA512
6cae2f6e7b86052af6f812e815128f67ce76f44e56b9bfdb5e4fa0ce2fba5610deb830334162b330e5e494bece380d1f7e053f6f89eac398d48fe49cbb3626ec
-
SSDEEP
384:vKNssJiGagRYwZSFFOECXCghDStXdTX2XXXiXs31TNWE/cJ1:vq9agRYwZSGECXCgM7rGHqc1IE/m
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-