General

  • Target

    DRAFTCOPY.098777-BILLADING-UPDATEDTRACKING99998YT6.exe

  • Size

    1.1MB

  • Sample

    230113-m2tjfsgd34

  • MD5

    46517b469ec589b249fe1990c0c460d9

  • SHA1

    d5e3e212edfff00ff973a1cee17a8029364b87c6

  • SHA256

    6f4db9c0b9d6190016964bf3916c3f3a5b8f600ea4ed25955ddce5a45166bc0d

  • SHA512

    b0b163c7478e6e82425d9313a25318a273e4cb0dd55866095d3e493d239b1d84c7242a6566f42124a05f4ded820b704fba8e410651cb31f1d1743c2654852fa9

  • SSDEEP

    24576:/TbBv5rUiNuX1kSerCiPl/pkueDc/WufIPxRMa2tStaBAlfl:JB5Oezl/pkuXWgIPN264Sfl

Malware Config

Targets

    • Target

      DRAFTCOPY.098777-BILLADING-UPDATEDTRACKING99998YT6.exe

    • Size

      1.1MB

    • MD5

      46517b469ec589b249fe1990c0c460d9

    • SHA1

      d5e3e212edfff00ff973a1cee17a8029364b87c6

    • SHA256

      6f4db9c0b9d6190016964bf3916c3f3a5b8f600ea4ed25955ddce5a45166bc0d

    • SHA512

      b0b163c7478e6e82425d9313a25318a273e4cb0dd55866095d3e493d239b1d84c7242a6566f42124a05f4ded820b704fba8e410651cb31f1d1743c2654852fa9

    • SSDEEP

      24576:/TbBv5rUiNuX1kSerCiPl/pkueDc/WufIPxRMa2tStaBAlfl:JB5Oezl/pkuXWgIPN264Sfl

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • WSHRAT payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks