f94bfce5384f10201df977d67ea6c5d1.js

General
Target

f94bfce5384f10201df977d67ea6c5d1.js

Size

179KB

Sample

210316-144qqm6zqa

Score
10 /10
MD5

f94bfce5384f10201df977d67ea6c5d1

SHA1

fb5f56e7e554d466b6ca7264c2748826daac8cc7

SHA256

ba25eeb1352d5aab2e09eaa942324510ecd964671e7def1e158c3a543534ca1b

SHA512

492e18b7a219734a9564bd330f5350582bd3c01d72ce0eb491343777d32dec5162c6deaf2c97ee6d6f68e1e2a025182dc20312fc4fe7c1024e0970ab1056ef65

Malware Config
Targets
Target

f94bfce5384f10201df977d67ea6c5d1.js

MD5

f94bfce5384f10201df977d67ea6c5d1

Filesize

179KB

Score
10 /10
SHA1

fb5f56e7e554d466b6ca7264c2748826daac8cc7

SHA256

ba25eeb1352d5aab2e09eaa942324510ecd964671e7def1e158c3a543534ca1b

SHA512

492e18b7a219734a9564bd330f5350582bd3c01d72ce0eb491343777d32dec5162c6deaf2c97ee6d6f68e1e2a025182dc20312fc4fe7c1024e0970ab1056ef65

Tags

Signatures

  • WSHRAT

    Description

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

    Tags

  • WSHRAT Payload

  • Blocklisted process makes network request

  • Drops startup file

  • Adds Run key to start application

    Tags

    TTPs

    Registry Run Keys / Startup Folder Modify Registry
  • Looks up external IP address via web service

    Description

    Uses a legitimate IP lookup service to find the infected system's external IP.

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
        Execution
          Exfiltration
            Impact
              Initial Access
                Lateral Movement
                  Privilege Escalation
                    Tasks

                    static1

                    behavioral1

                    10/10

                    behavioral2

                    10/10