General

  • Target

    Complete documents.js

  • Size

    278KB

  • Sample

    220628-h4xxfahfd5

  • MD5

    73c18351745de8bb47262a331169fbaf

  • SHA1

    1ef001a039e0038cde60c21c54c6c599f2932ba3

  • SHA256

    8221b6211f79e4818887d04abe5bc795ad145111f56b700434129ebfa7d3611e

  • SHA512

    a8e112e45dba72a787e5bc78333946d5f4400fc14e6570c4c458e60a1a5e45742f3d49c16fe3a65e089d9c5787a1534cdf98f432e7885d5ba1011155e9a6ef16

Malware Config

Extracted

Family

wshrat

C2

http://45.141.237.3:3030

Targets

    • Target

      Complete documents.js

    • Size

      278KB

    • MD5

      73c18351745de8bb47262a331169fbaf

    • SHA1

      1ef001a039e0038cde60c21c54c6c599f2932ba3

    • SHA256

      8221b6211f79e4818887d04abe5bc795ad145111f56b700434129ebfa7d3611e

    • SHA512

      a8e112e45dba72a787e5bc78333946d5f4400fc14e6570c4c458e60a1a5e45742f3d49c16fe3a65e089d9c5787a1534cdf98f432e7885d5ba1011155e9a6ef16

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • suricata: ET MALWARE WSHRAT CnC Checkin

      suricata: ET MALWARE WSHRAT CnC Checkin

    • suricata: ET MALWARE WSHRAT Credential Dump Module Download Command Inbound

      suricata: ET MALWARE WSHRAT Credential Dump Module Download Command Inbound

    • suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1

      suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks