General

  • Target

    Requerimiento.js

  • Size

    717KB

  • Sample

    210420-a6dmjq1pke

  • MD5

    43fd28ecaeace181efbcf9c92beba372

  • SHA1

    e02d5fa5f91ddc86a7b9d0430f2dece655642883

  • SHA256

    0d429448ceb1cd9b1412757154eaa58e5b08034b65dcd2e77439d617e9bd4944

  • SHA512

    70aa32aa6718ea1304761a75fa3aa66da9efae297c5bd81c8d4502efb56f4cfbb4021c6b6740daf11948c591cb6d37f99046d00c7d1ad2aa7f3256f05745021b

Malware Config

Targets

    • Target

      Requerimiento.js

    • Size

      717KB

    • MD5

      43fd28ecaeace181efbcf9c92beba372

    • SHA1

      e02d5fa5f91ddc86a7b9d0430f2dece655642883

    • SHA256

      0d429448ceb1cd9b1412757154eaa58e5b08034b65dcd2e77439d617e9bd4944

    • SHA512

      70aa32aa6718ea1304761a75fa3aa66da9efae297c5bd81c8d4502efb56f4cfbb4021c6b6740daf11948c591cb6d37f99046d00c7d1ad2aa7f3256f05745021b

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks