General

  • Target

    82190aff405aa674adf49568649fe52b.bin

  • Size

    8KB

  • Sample

    230329-bs3j8aec24

  • MD5

    35f5b9d8a1cacf8e6c78ab195d12235c

  • SHA1

    28379e1382e748216fcbc3d892cdc076d94712bd

  • SHA256

    58c8683c12b881750b510dc3b5577a7bb0ae2f598fa3ab5929bb4f6d20abdc03

  • SHA512

    5f89700a76f25635dbc18450337b49a198fa9a3df79f6520883307dccb9048b7eff4b0dee6dc571a1a8673f0c0f9accfe28117e6e197e5854ae9b1bdea2d131a

  • SSDEEP

    192:KkTo3EwbCobEyjmQrDfNIjxTCtwKyeYLiok8SpNuiVgOxRuN:KkTo3EGCrkmINa6wiYulq8RuN

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Targets

    • Target

      6e23d208c9821f239e6ad6c52018a201e0a53842c3885b0aa4017c01518bd247.vbs

    • Size

      255KB

    • MD5

      82190aff405aa674adf49568649fe52b

    • SHA1

      966d1fa684290305b77cebad19f70ebedee66f3e

    • SHA256

      6e23d208c9821f239e6ad6c52018a201e0a53842c3885b0aa4017c01518bd247

    • SHA512

      de9a038defd43e12df8ee0b53cae2632408fc79a67c9340213d1c2d71436b41acbdb6d1feb16ee96f769cf629ca8e89c289d406265bb3081614288aa9d879d8b

    • SSDEEP

      768:9+i+03whqCx8CG5CsJRxhcxSLeK5BpmamOD5Z3rxRQ:+j

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks