General

  • Target

    a82190a1aa4c07cf23e80083694ae1fd.bin

  • Size

    9KB

  • Sample

    230303-b1mhzafc7s

  • MD5

    7e83c1cf150b77c2d3bd529c15e1c329

  • SHA1

    c313e4d0e4063e2c6ed2f6e356395f5f59ccbd07

  • SHA256

    3e0a98bcc5a42869c0afa89ef0f32ccc974ceb62f79f3329049a6b8239711678

  • SHA512

    dcebe9dabd64d0ce542233f82de102523cbc3266415640d951d948c8a3fb29beac70e2ececb9839b694bd92edf571025c2540c32ce8b0468440e5474d25aeb27

  • SSDEEP

    192:Q7Dimo38oVtDBlL8X8/KptShjaKC8re7MrvTfiIpmpSQCDJ2YQ9Ll:ODBGDBlL8M/Kpshjagr9pmGFVyLl

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Targets

    • Target

      ca8c51adb24f855f6e92f107ccb4b782081661d8a5288b08bf4fd5911ae02585.vbs

    • Size

      273KB

    • MD5

      a82190a1aa4c07cf23e80083694ae1fd

    • SHA1

      d62b8414e9872584c1498584b68b61e5a0e4dd26

    • SHA256

      ca8c51adb24f855f6e92f107ccb4b782081661d8a5288b08bf4fd5911ae02585

    • SHA512

      6b594b492aac69dfe0e2ff352b9ce131293bb4acdf7a9391200d1da8bd378f241160510da03cb53e1551a240dd90a1e773c9f35064b9cf5cd70dd4bc82b2f01f

    • SSDEEP

      384:B3gLoLuSIMHELTMbseb4jxvTuh0I6EJG7T7EYXDL787OD3Hk2YeE1dDvJuVGKrhh:r/i

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks