General
-
Target
a1f3abf50f088fb22c49e8222448f550_JaffaCakes118
-
Size
40KB
-
Sample
240612-x1skwawhkh
-
MD5
a1f3abf50f088fb22c49e8222448f550
-
SHA1
304d14ead835f78e95380d45261649a596e1360a
-
SHA256
6aa963d6f4458c282617c2d9d887dd056f84407a592971f5453728f3e73cdce1
-
SHA512
02c863aa5259a5bdeb2f61050610ba6dee09b7fc31eb6553687266117b8ca657393606e157bcce1822913dac24587c20b3e2ab9655400bf57266342edd999599
-
SSDEEP
768:Az3DbY7Jq5Jfa6TN07gtGuaM07TZu/ThXGOmHcUckwlaLrQt0Lg83Ak:3QXfa8N07gtGNMYOG8blaLrQl1k
Static task
static1
Behavioral task
behavioral1
Sample
20191207_PO_HCMCJR_URGENT.js
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
20191207_PO_HCMCJR_URGENT.js
Resource
win10v2004-20240226-en
Malware Config
Extracted
wshrat
http://unknownsoft.duckdns.org:7744
Targets
-
-
Target
20191207_PO_HCMCJR_URGENT.js
-
Size
116KB
-
MD5
8ab0aa6617da302cfdf3cfd5f69befb2
-
SHA1
a6598fe37552a5b66d672d12dd3fdbf4d79597dc
-
SHA256
31c763ec4f5801e2127d655f0e84bba0f020ba2af54ee6f48964b096d53d478c
-
SHA512
220e52d8f8c8f22fc50614f9cd31c20b19e6201cc065c3653302caadbca64f346caa7dece2d69e46624ac92ea3815882b6f3fa6fe2dea9a3af9f293e9bcd3739
-
SSDEEP
1536:nwZ/j/5W3lrlGPU1Z9inn6aM9F4LZ7f2vBPgTLJZV+NM1PojBCveiN44QZGxMKQY:nSj/IVEUkxLpfXr1PokG5ZR70CLW
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-