General

  • Target

    ORDER_230320.pdf_1.xz

  • Size

    8KB

  • Sample

    230320-xm2xdsgh6y

  • MD5

    e759742e2878b202f658cb2d8984e120

  • SHA1

    62c73cc606d5856dcfc81d0e37e821fd8594cd7e

  • SHA256

    ce2082e44afef92b5997869f6e17cfadd6326390c398c6316afda1a5eaedbd5f

  • SHA512

    a0f45e51aba7281caf379dfead4c4ccbad9c90ddc65e596c0a6fe7c415b50c56cce03c34ac0ccd6272b20afe35c8a64919748e8ca87c05ee26af146ce7ff8ced

  • SSDEEP

    192:ElxluqMkH20Hr/HJdEztyiCHttlwoV434KpyBuurUagx:qluWPL/HJ6o3HttjVCcAurUaG

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Targets

    • Target

      ORDER_230320.pdf.vbs

    • Size

      267KB

    • MD5

      a4876007d9afb92163ed9933656eacbd

    • SHA1

      8eafbf2887bb39ac089c95b50bf34fd27b7ee36f

    • SHA256

      a58c4155a01aab820977ec8d2880edc9408b320f54ec7089db79e50da1b525a7

    • SHA512

      8db4e28e3e1718416c1a3dfe7d461efd429345621f30bfe2f3b67532e2c26833a53b57a89cd4b3587488bf017926076b12b92ec15e1868babe5ded766cfa335c

    • SSDEEP

      768:NGiZmuiZO+YlWGNOHGxOrBr/kXiFs6d3f9GdsGd+9dP1EC4SV5BW:l

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks