General
-
Target
ecb7a24fe997c5ee28816ad8bbdba6b8d3427fa26e455575b9857419d702e9c2.js
-
Size
1.1MB
-
Sample
240928-cfgbwstdld
-
MD5
d0b22868d8e8452a819b4d8b80ae0292
-
SHA1
40e687610e437bc1037979f0d5490bdab326ebe7
-
SHA256
ecb7a24fe997c5ee28816ad8bbdba6b8d3427fa26e455575b9857419d702e9c2
-
SHA512
b1869c132e052a772af298163b1a96785b86be1b4baf919c33390dec0e7b025998c5b58ca4479e4857e5cf97b09e2df15e2aba445dbed0db22b782f8d6f5e743
-
SSDEEP
12288:w5oRko/g1Lnv2qqxOJQEWka0CVdfE4SeDb7bLETDA8meRaFnjCcpYVE2a7RkysUa:w9
Static task
static1
Behavioral task
behavioral1
Sample
ecb7a24fe997c5ee28816ad8bbdba6b8d3427fa26e455575b9857419d702e9c2.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ecb7a24fe997c5ee28816ad8bbdba6b8d3427fa26e455575b9857419d702e9c2.js
Resource
win10v2004-20240802-en
Malware Config
Extracted
wshrat
http://rolla.wikaba.com:2025
Targets
-
-
Target
ecb7a24fe997c5ee28816ad8bbdba6b8d3427fa26e455575b9857419d702e9c2.js
-
Size
1.1MB
-
MD5
d0b22868d8e8452a819b4d8b80ae0292
-
SHA1
40e687610e437bc1037979f0d5490bdab326ebe7
-
SHA256
ecb7a24fe997c5ee28816ad8bbdba6b8d3427fa26e455575b9857419d702e9c2
-
SHA512
b1869c132e052a772af298163b1a96785b86be1b4baf919c33390dec0e7b025998c5b58ca4479e4857e5cf97b09e2df15e2aba445dbed0db22b782f8d6f5e743
-
SSDEEP
12288:w5oRko/g1Lnv2qqxOJQEWka0CVdfE4SeDb7bLETDA8meRaFnjCcpYVE2a7RkysUa:w9
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-