General

  • Target

    0a72d138c339bdb349da3c3311ba42d9.bin

  • Size

    218KB

  • Sample

    230408-bct8xadc21

  • MD5

    e657564b5e03c287683e3ea5f98e0d45

  • SHA1

    0603bee8a2edc0bcd997a3035971bbf682de9b1f

  • SHA256

    699fdfbf624be71c9c2b36081e22209aa7ad96dd5cedaf6fc0fcb1fd37720c1f

  • SHA512

    b7aba009338b9ffb591bc09a340cb6f8cb4be2f69a8bd6ab70738f523f08bf5144b9c2e8fed7f10a26eeeb2a580f6af6d6960fed7ab1218a40e49563ef7354b3

  • SSDEEP

    6144:eiRM/ZZKG6oENMLSwEMjaJp34vKWSC6vKqWEukDVy:0/ZUGQMmwEMjaJp3k56iqWEukg

Score
10/10

Malware Config

Extracted

Family

wshrat

C2

http://harold.2waky.com:3609

Targets

    • Target

      8430808dd1aed6da9483dfe4c24a6747b65d3b542b407f462358c42a6a423e3b.js

    • Size

      1.1MB

    • MD5

      0a72d138c339bdb349da3c3311ba42d9

    • SHA1

      39d2a2aa91b20890b205e3afbfa6998316264ad9

    • SHA256

      8430808dd1aed6da9483dfe4c24a6747b65d3b542b407f462358c42a6a423e3b

    • SHA512

      a51616d35b40731d825ea1ca6900f68cc3add16594f0aa63a565afdd3a756165c86aad3b52363352d7118ef7cc071c0255517837de9397ab8f447ea8f3b539e8

    • SSDEEP

      6144:MQJzmNEfYck5GmLcmSmA3ntOsAZelVWGNODAVnBk5ogYgtsY52PyeeZ4w5QVaQUU:X/7

    Score
    10/10
    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks