General

  • Target

    e860516a4fe33da6bc6476a4bfd4d1bf3eb154f649a52bd94c56b9bfd0b6360d.zip

  • Size

    8KB

  • Sample

    230321-r5yd2ade9y

  • MD5

    7411bdb21cc7564bed23cc4890c16434

  • SHA1

    285df246940564c55d6152cfbdb2cde1a25b97d9

  • SHA256

    a414a207806c87bd02c6c4cacf273de1be049153811aca5b7280ecc03fed4694

  • SHA512

    e997f0d6ed77119980e078fbb6b57a8cb73b4f9cf45db514d202c1602d44f27c7d275ce745af83efd09c11556103fbc66406a196e9df13e454cf9d77d5d33232

  • SSDEEP

    192:0/5776zMJ24ojItcymyLWXhYXVsz2ITRFO9HVWtEQ:0BaU240LxJTkW

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Targets

    • Target

      e860516a4fe33da6bc6476a4bfd4d1bf3eb154f649a52bd94c56b9bfd0b6360d.vbs

    • Size

      204KB

    • MD5

      c7f700216276af81e05bf12c7650f776

    • SHA1

      b2d4e89dfb652f73fbb0551c912682a0e38403c4

    • SHA256

      e860516a4fe33da6bc6476a4bfd4d1bf3eb154f649a52bd94c56b9bfd0b6360d

    • SHA512

      d8c6a27e07195579752ba17a67d7aae87ba269cde729fd837ed7e301ecf29adae6c8e607805756a06a2fe593fb6d0271b81cd2fde56eefa200e45281eb384d60

    • SSDEEP

      768:1LHYKIi81ZdqfsaBMKO5+rX5qJrgLS4JSr1NDFD6yaf6Nlr0TuNtrDuNqDuNm4uE:PflyR6XQHG

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks