General

  • Target

    587dbf7f25e6078a552505be43c9013c5be3ce454ecc5c64edd5a3598325aebf

  • Size

    449KB

  • Sample

    230408-hvsw5aec2w

  • MD5

    24970aab6d2f2388a1bb986fbc16f56b

  • SHA1

    847986dce6acc5da7c5bab853ab9317035114024

  • SHA256

    587dbf7f25e6078a552505be43c9013c5be3ce454ecc5c64edd5a3598325aebf

  • SHA512

    85bd00115e4097e4d880c5946a7766f34470a3c822b31e8688ce850b5ad2cd05a9234df78f282799cfdba148689417bf46e8aa1f3af18c3f9a950590ca4834b3

  • SSDEEP

    12288:vYxDYzoG3JGoShnxu5uwo3HzZkniGBZwzm0CK2F:vYxd4S9xufezZhGBZwzm9P

Malware Config

Targets

    • Target

      587dbf7f25e6078a552505be43c9013c5be3ce454ecc5c64edd5a3598325aebf

    • Size

      449KB

    • MD5

      24970aab6d2f2388a1bb986fbc16f56b

    • SHA1

      847986dce6acc5da7c5bab853ab9317035114024

    • SHA256

      587dbf7f25e6078a552505be43c9013c5be3ce454ecc5c64edd5a3598325aebf

    • SHA512

      85bd00115e4097e4d880c5946a7766f34470a3c822b31e8688ce850b5ad2cd05a9234df78f282799cfdba148689417bf46e8aa1f3af18c3f9a950590ca4834b3

    • SSDEEP

      12288:vYxDYzoG3JGoShnxu5uwo3HzZkniGBZwzm0CK2F:vYxd4S9xufezZhGBZwzm9P

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • WSHRAT payload

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks