General

  • Target

    doc00000024720000.js

  • Size

    196KB

  • Sample

    221212-vhzv5aef8z

  • MD5

    0a568e550259227e12d5fad3e44278d9

  • SHA1

    ea93668fdfada948e617a98f2a9c1e60cca34cea

  • SHA256

    660ade8ec5e8a4d96829bf974782baa25b76fe5626ae29a319ebb448b58a4a67

  • SHA512

    e3aa2c5dfe9aa56dfc122c4d6c523665edae5555a66ea1f966efb95022811e961c0881c30c02e9d0f4115a19908c2961e188b4a1df7efff88141842b99b6f609

  • SSDEEP

    3072:FIGmE69uz3ugounzuwdnnir6KjdbNelhkaJ:FIGmIto2zjdng6Kjj2J

Malware Config

Extracted

Family

wshrat

C2

http://45.139.105.174:1604

Targets

    • Target

      doc00000024720000.js

    • Size

      196KB

    • MD5

      0a568e550259227e12d5fad3e44278d9

    • SHA1

      ea93668fdfada948e617a98f2a9c1e60cca34cea

    • SHA256

      660ade8ec5e8a4d96829bf974782baa25b76fe5626ae29a319ebb448b58a4a67

    • SHA512

      e3aa2c5dfe9aa56dfc122c4d6c523665edae5555a66ea1f966efb95022811e961c0881c30c02e9d0f4115a19908c2961e188b4a1df7efff88141842b99b6f609

    • SSDEEP

      3072:FIGmE69uz3ugounzuwdnnir6KjdbNelhkaJ:FIGmIto2zjdng6Kjj2J

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks