General

  • Target

    PO.230029.rar

  • Size

    230KB

  • Sample

    230215-yx9knadg96

  • MD5

    6fbf79929549795aa479bf75b8f200c3

  • SHA1

    83da86e16883fa4192f57333c7912ca1cc6f122f

  • SHA256

    6170f6b6d0e8b91a5fd037a7322bfe80471b982c066fd1ea64e588eaad3147b1

  • SHA512

    5e6ae9dc3cf1c0baa5c33ba0913ebd213123f297865aa69b2c97c2326b609ce4abad4c43c59b674537fd409985f03dc7c08a7b504184b55344f2e2af0e396a4c

  • SSDEEP

    6144:VyUlZ1WcisqyjQHaMVv+e42wAzdq3+ly8K7aDNdr:VyURbqeQHhv+el1dqWy/7Kf

Malware Config

Extracted

Family

wshrat

C2

http://datalogs33.ddns.net:48665

Targets

    • Target

      PO.230029.js

    • Size

      3.5MB

    • MD5

      2760f9a45e9e74c4eedfe9b0ee918e6b

    • SHA1

      277c62b14c987da3cf4c9e7d4ee4478cf61580c7

    • SHA256

      18827fed6ecd5e4d2c548dcad1eb21730a95f52b578bed75e3003b06a7390482

    • SHA512

      45aa5c7a51f644e82fc436029187fef542ee9a3be80ed8c3535c0383c938509f4d3f4414c97328430092bec1eed5a5105d47f45f36664f49c63a146b12a9fb7e

    • SSDEEP

      6144:nDKcCNX9cMH0svW5he7NbWSRU9qB02HkyjM6P:nDupdf

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks