General

  • Target

    ORDER_432023.pdf.xz

  • Size

    7KB

  • Sample

    230405-wsllxsaf9w

  • MD5

    008e9c8eba08ed031c30fc10f805c369

  • SHA1

    4a479570f970b73b82580276719d14a0f3f84be6

  • SHA256

    812a24ac6164c88b6c931ec66339785e85dc0d1f10155c0dfc13353e43352cd5

  • SHA512

    c5ade27d5d59dc6b7f4a3b3ba8da052771c9491e5c413ddeed50c3bfaec8af13ab27b7ffefe255a03cee6843dbeec7e5ef4b9cfc80d3c912fa1dc7dfddd67a65

  • SSDEEP

    192:Z60eExX1KfXrznz5domBuvqN/YyzdErXyL8:40eEOf7H5KmLY8dErXyL8

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Targets

    • Target

      ORDER_432023.vbs

    • Size

      218KB

    • MD5

      6ecd1b4c44ebec3bb195abc6e0aeb1fc

    • SHA1

      d09b365dc98d35e3e53e49503184f38aa9efd9b5

    • SHA256

      9dfca9429d741fb4b39d97c4d48e4c542193cc68930faead1c77e74f9bf3678f

    • SHA512

      8974df412ee71fa4a54a702038bbcf45fa53ad439f8c8dfde84e3b15857f99560fbca44fd101fb13e649b647e888cf0fd0945fd83389ffe0f6c75a424baa3b0a

    • SSDEEP

      768:uYcgYP1Tsg0HlHsf6I7j3nS3ftCSrCURr4n+xPJOxkvsWssnZ1BWKsnCWKsnSRQz:Aj

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks