General

  • Target

    BCGroup-191222-Order.js

  • Size

    601KB

  • Sample

    221219-kd71tshf3s

  • MD5

    40918a71cd25cc1820b6e6e53bf0728d

  • SHA1

    36761e8095259d13927cba982861e88df9ab501f

  • SHA256

    4c9c294340ea1d2c1fc760fb5d5d55c378de7e369134bd1ac0c16bcad545af76

  • SHA512

    4589969fe1752d1538383681be26ee8b95866b5794b104cf369cc81eadce237138ba68a9e9779cb56e7bcf4fa131cf71c569aaaac1a749b5976fa93e3fce56f6

  • SSDEEP

    3072:CTw2WBCzajIMRoRO+Qchbchh3WZ/LKmWx1AKhKq+daJpOJVK5f9Ll/kFQkOzeI5k:CttlBQIcGsLlb3R7RSvTOUntCzp4W8

Malware Config

Extracted

Family

wshrat

C2

http://45.139.105.174:1604

Targets

    • Target

      BCGroup-191222-Order.js

    • Size

      601KB

    • MD5

      40918a71cd25cc1820b6e6e53bf0728d

    • SHA1

      36761e8095259d13927cba982861e88df9ab501f

    • SHA256

      4c9c294340ea1d2c1fc760fb5d5d55c378de7e369134bd1ac0c16bcad545af76

    • SHA512

      4589969fe1752d1538383681be26ee8b95866b5794b104cf369cc81eadce237138ba68a9e9779cb56e7bcf4fa131cf71c569aaaac1a749b5976fa93e3fce56f6

    • SSDEEP

      3072:CTw2WBCzajIMRoRO+Qchbchh3WZ/LKmWx1AKhKq+daJpOJVK5f9Ll/kFQkOzeI5k:CttlBQIcGsLlb3R7RSvTOUntCzp4W8

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks