General
-
Target
Invoice_(PO_3078320)_EXIM-TECH.js
-
Size
376KB
-
Sample
240506-bjbedaca31
-
MD5
c8fb1648a210dc192935a6e3c8f7cf18
-
SHA1
ea948879f297cfbb8ab96ba080c4f395dbda3e53
-
SHA256
90287f6a65069dc57e8ceac20e6c80da6afa2cab81eeb70011c1391ff1e8083f
-
SHA512
6ed050a0c5bf0921fc4e431bfd7bdda13c4a2d7395c7a333a3255fd7ad6e815f3da55e054d5fdb930fa17c79d8d81919a241b1494fbd2ca9629323424a6a8d49
-
SSDEEP
6144:lEaXAklgF2GuuZHi6/eMngRCEeGKjCNEaXAklgF2GuuZHi6/eMngRCEeGKjC/:Nvl029SiogKGKjCVvl029SiogKGKjC/
Behavioral task
behavioral1
Sample
Invoice_(PO_3078320)_EXIM-TECH.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Invoice_(PO_3078320)_EXIM-TECH.js
Resource
win10v2004-20240419-en
Malware Config
Extracted
wshrat
http://masterokrwh.duckdns.org:7963
Targets
-
-
Target
Invoice_(PO_3078320)_EXIM-TECH.js
-
Size
376KB
-
MD5
c8fb1648a210dc192935a6e3c8f7cf18
-
SHA1
ea948879f297cfbb8ab96ba080c4f395dbda3e53
-
SHA256
90287f6a65069dc57e8ceac20e6c80da6afa2cab81eeb70011c1391ff1e8083f
-
SHA512
6ed050a0c5bf0921fc4e431bfd7bdda13c4a2d7395c7a333a3255fd7ad6e815f3da55e054d5fdb930fa17c79d8d81919a241b1494fbd2ca9629323424a6a8d49
-
SSDEEP
6144:lEaXAklgF2GuuZHi6/eMngRCEeGKjCNEaXAklgF2GuuZHi6/eMngRCEeGKjC/:Nvl029SiogKGKjCVvl029SiogKGKjC/
Score10/10-
WSHRAT payload
-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-