General

  • Target

    Solicitation#E62-357.pdf.js

  • Size

    1.2MB

  • Sample

    230125-vfn1vahb42

  • MD5

    cbb9e8783d23b22f610462c202688dd2

  • SHA1

    8f76df9b5b311c145c56a2c759c519955dfc430f

  • SHA256

    c1b90fc87c2bc154d8157e388186d82e7b0e03a918b07b5f70d2a5bedcd5901c

  • SHA512

    34862dbcc4072965059e704697cedbe1e274e34ca37318adfe2111da2a2a86b6a1977ec7f81f48aa8da5ea0692b147bd10d5ae1991c7d62edb35cd5f45d7eab8

  • SSDEEP

    6144:eQfPBx5q0sQ1o7rsbHC01mDBpNW2mTMSbpuV8jmrPJ729wORKlhxqxTOTMOpQvcg:eQ3B7qgpkrP4YtTMSlmUFclgZ/tDwLsw

Malware Config

Extracted

Family

wshrat

C2

http://bona.kasowiitz.com:50125

Targets

    • Target

      Solicitation#E62-357.pdf.js

    • Size

      1.2MB

    • MD5

      cbb9e8783d23b22f610462c202688dd2

    • SHA1

      8f76df9b5b311c145c56a2c759c519955dfc430f

    • SHA256

      c1b90fc87c2bc154d8157e388186d82e7b0e03a918b07b5f70d2a5bedcd5901c

    • SHA512

      34862dbcc4072965059e704697cedbe1e274e34ca37318adfe2111da2a2a86b6a1977ec7f81f48aa8da5ea0692b147bd10d5ae1991c7d62edb35cd5f45d7eab8

    • SSDEEP

      6144:eQfPBx5q0sQ1o7rsbHC01mDBpNW2mTMSbpuV8jmrPJ729wORKlhxqxTOTMOpQvcg:eQ3B7qgpkrP4YtTMSlmUFclgZ/tDwLsw

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks