General
-
Target
2027db19e08f49cb365ca8523145ff5ce77bf4b4430075c3bf274f4a4f3f789b.js
-
Size
614KB
-
Sample
240508-bwy17sbc7w
-
MD5
2299cd103202899b48a32a317f58192d
-
SHA1
f813552dffb221b7cfaf356d571bf6468b9e58aa
-
SHA256
2027db19e08f49cb365ca8523145ff5ce77bf4b4430075c3bf274f4a4f3f789b
-
SHA512
2385b8acefda53c6620bb220e7dc5a8fde64c7d6ccb110a6a0d32152d0d87444fcfbc88bb9dbef322f0ced7bc27b92d43fc1bc1bb5d409f289ae86b816123d14
-
SSDEEP
12288:kYeIrWr/qRigAyX/kngXFbjTLvaH28nZH19Iimg0VtxWvTbxzOObcizI/mofdEMU:kYeIrWr/qRigAyX/kngXFbjTLvaH28nJ
Static task
static1
Behavioral task
behavioral1
Sample
2027db19e08f49cb365ca8523145ff5ce77bf4b4430075c3bf274f4a4f3f789b.js
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2027db19e08f49cb365ca8523145ff5ce77bf4b4430075c3bf274f4a4f3f789b.js
Resource
win10v2004-20240419-en
Malware Config
Extracted
wshrat
http://masterokrwh.duckdns.org:8426
Targets
-
-
Target
2027db19e08f49cb365ca8523145ff5ce77bf4b4430075c3bf274f4a4f3f789b.js
-
Size
614KB
-
MD5
2299cd103202899b48a32a317f58192d
-
SHA1
f813552dffb221b7cfaf356d571bf6468b9e58aa
-
SHA256
2027db19e08f49cb365ca8523145ff5ce77bf4b4430075c3bf274f4a4f3f789b
-
SHA512
2385b8acefda53c6620bb220e7dc5a8fde64c7d6ccb110a6a0d32152d0d87444fcfbc88bb9dbef322f0ced7bc27b92d43fc1bc1bb5d409f289ae86b816123d14
-
SSDEEP
12288:kYeIrWr/qRigAyX/kngXFbjTLvaH28nZH19Iimg0VtxWvTbxzOObcizI/mofdEMU:kYeIrWr/qRigAyX/kngXFbjTLvaH28nJ
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-