General
-
Target
8dcc2c7236870e00097d09cadc066b03.bin
-
Size
159KB
-
Sample
240504-bzkmzsch34
-
MD5
d881b196a197d7506b7bbeffdab35f27
-
SHA1
52efd1ec2a6b9816357bbaa006c2efdf2f941c81
-
SHA256
f2ba66e2e18a13528324d57b98a84c2ec02f3893de90f9fb34be7ab0445c8166
-
SHA512
bafbe5d52ee82dd7bf8fc5a2d446a1b002f8823b0305332cd48ee956301f56c880e45c400f1582b630f69e2a00150fd4345adf12012d8dbf6c3bca6923b2b1c1
-
SSDEEP
3072:y9V2RrL9ybkPSNRqwZEe/OuyACqcq86xJd74fosRn2AkKXPpxbHha:yerhtIRqw+luyAaD6ho72tKfta
Static task
static1
Behavioral task
behavioral1
Sample
d968cf117419570bc67f57a2be52a648d2253346fd60489c06435fdbe518c61e.js
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d968cf117419570bc67f57a2be52a648d2253346fd60489c06435fdbe518c61e.js
Resource
win10v2004-20240419-en
Malware Config
Extracted
wshrat
http://masterokrwh.duckdns.org:8426
Targets
-
-
Target
d968cf117419570bc67f57a2be52a648d2253346fd60489c06435fdbe518c61e.js
-
Size
615KB
-
MD5
8dcc2c7236870e00097d09cadc066b03
-
SHA1
2c9868c25000e2d7801dc9fd431d6ba99b694e16
-
SHA256
d968cf117419570bc67f57a2be52a648d2253346fd60489c06435fdbe518c61e
-
SHA512
918ee5a3a83fcbc098b294077c0fd5888ccc05e0785ef749c788be763ddd2750fe6daa67904b9de2d77cdb9dfab4dc7b65db25e1c18ab5d33f969e81fdae9cf5
-
SSDEEP
12288:fYeIrWr/qRigAyX/kngXFbjTLvaH28nZH19Iimg0VtxWvTbxzOObcizI/mofdEMp:fYeIrWr/qRigAyX/kngXFbjTLvaH28ng
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-