General
-
Target
10042025_1526_ORDER-709856-250410AT.js.rar
-
Size
759B
-
Sample
250410-st7n1avyhw
-
MD5
ad9cab58ce9d0c6952cbc4f6a74183cb
-
SHA1
21fb395c472e8d913b6937804259de96e550cbf0
-
SHA256
c3d858e6a9bed6193b7bbce751427703203bf0524a59fe072da87fee62b23274
-
SHA512
532fee1b8648a1d15a018941fa4af2ce94bfab7d376d0aaef13b575347bd7b0b09c5995330ce8bfbac8641e631fe141147cdd64cf200839776bd31265895b290
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-709856-250410AT.js
Resource
win10v2004-20250314-en
Malware Config
Extracted
wshrat
http://chongmei33.myddns.rocks:7044
Targets
-
-
Target
ORDER-709856-250410AT.js
-
Size
7KB
-
MD5
f59cdef1183c8bab106bc1576ba7753d
-
SHA1
fb6420ddaee10ab75482702322acb7fb6dfb7751
-
SHA256
1e93ac50d985016adb746750e1e53a686b3dadbe5f5dc52fd3ec9be6c9e4e384
-
SHA512
4552376e1546208f981451ecc7387a1fd9fd7c2cdb0c980794d737a6c46cbb8f8cb4ca9542c1ffac3d7c53694b3034089a3e9dcd07a3cdc37960d0780786ad2f
-
SSDEEP
192:JxW3IUkc9ZgGdmiFCndDvW8IL7f9WOELn0XmsWgCqIiCN9CCBCCpBCCswCCiCCgp:JxW3IUkc9ZgGdmiFCndDvW8IL7f9WOE9
Score10/10-
Wshrat family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v16
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1