General
-
Target
40d85b56e7392f84a265c3e43209112c.bin
-
Size
824KB
-
Sample
240505-bldyaada93
-
MD5
03ec38ab643174de42e8014a617a0eff
-
SHA1
9d59b0f53c2b902ecaed72256a609b0af43c8085
-
SHA256
64a6e15edb83670237b6c80c8bb4ffae41fc1371937981561fd8a3b010ca1572
-
SHA512
f4ef998e4b6ea81be0c0e9eed7185b7aea4f78f751ecd2b621691b1fe12c14a2c9382a3d9cb3b5e1c47be8870be7dbf74ca538fff21d265ad51dd1578535deaa
-
SSDEEP
12288:SCSuRbzXQGRVbK/1Ml/sTJAUbwwl+gJAtiS5e21jj9txji9A5lhn:71Rbz1l/sdASwITutbe6j9T2G5/n
Static task
static1
Behavioral task
behavioral1
Sample
57679766d792132497921ab478f7802f3599a8d19a9c4190045e3a139e9f2c52.js
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
57679766d792132497921ab478f7802f3599a8d19a9c4190045e3a139e9f2c52.js
Resource
win10v2004-20240419-en
Malware Config
Extracted
wshrat
http://masterokrwh.duckdns.org:8426
Targets
-
-
Target
57679766d792132497921ab478f7802f3599a8d19a9c4190045e3a139e9f2c52.js
-
Size
2.1MB
-
MD5
40d85b56e7392f84a265c3e43209112c
-
SHA1
c10e1c1c487f84dbb2cf5089f473529114a89859
-
SHA256
57679766d792132497921ab478f7802f3599a8d19a9c4190045e3a139e9f2c52
-
SHA512
203709c65208887bdc78bc02d366ee48a04b90e7e701876416a04b98b12e01e18e5468ddb69ff018ea52816b9e4eae0787bc024cc550d2d35271191829ae7690
-
SSDEEP
49152:gZknKnkiP2Kkaq4ePu3SomhEvQZuqCniSZae2h6ifBUw5LWrVRRNb/YopQESU3oW:w
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-