General

  • Target

    Quotation_230406A.pdf_1.xz

  • Size

    8KB

  • Sample

    230406-xal1eaed89

  • MD5

    a3d42b768b28af35bb5339ec38d47d6a

  • SHA1

    bead313bc15c6e0e7273b146acbcaad36ebe2aaa

  • SHA256

    3e922156cad894b1d7cfe17e02e90fe0b2c97d7fc8db93b3fde190ddd20a41ad

  • SHA512

    e6cfbbc641125286892f43dfd84ca6337313f032609600db468635de3f66a6bb649282bef700388d3fb356bb7d1ca7937d7894a7709ca1b60e8e66410b2621c5

  • SSDEEP

    192:EUcVGiU5MLDZ5TCqhssOk2YXqW7SmZ1CTRJJPIoq1:hmGZ2LfTCqssvXFSmuKoe

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Targets

    • Target

      Quotation_230406A.vbs

    • Size

      271KB

    • MD5

      26dd4d56ebc911f4088bff1a4ba6d90d

    • SHA1

      81be8f4ad3eb8061da6722a8e69c4ca67c0c1a66

    • SHA256

      a3d0cbb2060021757f2514e9f190b1ac4d7d0ec79bc91351ed7a794ba05cab0a

    • SHA512

      2cb54bd272b2238a2168828e69c39e0c9ed9017690f08130927a71aa89e638419cce3d63e8e582ec151414c8c6bc94a56b2d5e937a56df182914e8ac6e0b3f59

    • SSDEEP

      768:DQsieR2wEfnsuuhjdVex8HWqHBACAaDHfj5BjW:wl

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks