General

  • Target

    Spe00002.js

  • Size

    1.3MB

  • Sample

    230202-h3slbshc71

  • MD5

    d2d74972732d9af034ec0fb7bdf6b639

  • SHA1

    467f3fdff8f759d184794558a64c8207c6951f03

  • SHA256

    d835e918736fdcbe6a4b952f59059d9d1df2956f5c63758ed626cb2571a3e7ea

  • SHA512

    a4f58468403452b28ca533d0feb2767c4fa2ed22904915171c5205a0fecb2d223714a05311a7c71f1c3ec0a7e3e689121dd3cbd7220a44956c25ec2de635201b

  • SSDEEP

    6144:h1GlgoQx3ZUiezJ54oUViONwG/IkXpVUyrw7+Hjr5UFko+/clqoJ89laGHZ7RtAO:mHQxFukHUvtbpC

Malware Config

Extracted

Family

wshrat

C2

http://155.94.209.44:7121

Targets

    • Target

      Spe00002.js

    • Size

      1.3MB

    • MD5

      d2d74972732d9af034ec0fb7bdf6b639

    • SHA1

      467f3fdff8f759d184794558a64c8207c6951f03

    • SHA256

      d835e918736fdcbe6a4b952f59059d9d1df2956f5c63758ed626cb2571a3e7ea

    • SHA512

      a4f58468403452b28ca533d0feb2767c4fa2ed22904915171c5205a0fecb2d223714a05311a7c71f1c3ec0a7e3e689121dd3cbd7220a44956c25ec2de635201b

    • SSDEEP

      6144:h1GlgoQx3ZUiezJ54oUViONwG/IkXpVUyrw7+Hjr5UFko+/clqoJ89laGHZ7RtAO:mHQxFukHUvtbpC

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks