General

  • Target

    fattura.jar

  • Size

    221KB

  • Sample

    200710-ybcpwfddrn

  • MD5

    4ebaf0ed00b6136fe1e4273508d855fa

  • SHA1

    a3e6b82b95500b8eda4ab37a8f3865d47af3c7ad

  • SHA256

    be32a4b1ba9b1ac7803eac01ca4a38f96770ad27d2d434794809ba3242182b0d

  • SHA512

    80c243457a0b879b0cd2484837357326593131207e200f93cd4f40a2ce5dd4c8e5590c6f67638b7942c1ca6634abc637fa9658b81791116419960deb349f49c3

Malware Config

Targets

    • Target

      fattura.jar

    • Size

      221KB

    • MD5

      4ebaf0ed00b6136fe1e4273508d855fa

    • SHA1

      a3e6b82b95500b8eda4ab37a8f3865d47af3c7ad

    • SHA256

      be32a4b1ba9b1ac7803eac01ca4a38f96770ad27d2d434794809ba3242182b0d

    • SHA512

      80c243457a0b879b0cd2484837357326593131207e200f93cd4f40a2ce5dd4c8e5590c6f67638b7942c1ca6634abc637fa9658b81791116419960deb349f49c3

    • Ratty

      Ratty is an open source Java Remote Access Tool.

    • Ratty Rat Payload

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blacklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Tasks