General

  • Target

    dfaa0731635b4e0867fb1a5b00f97cd4.bin

  • Size

    8KB

  • Sample

    230411-b5nxlabd4v

  • MD5

    be5ff0c876d8128c586785af42db75b6

  • SHA1

    d064ccf5c1edc9b270569cdd77833e6e37a855cf

  • SHA256

    51fe490b18d7e136824a8eac22f4812e248b43cfa7eb9d594eee5ba8873c186c

  • SHA512

    390d0dc6af84a9a2101b78e80acb76aa7e464db144184da02032da5a73a620c2c23bf96f489732ec89f98977cf064c9b9661bb1a457514dad0ef834d1a100c77

  • SSDEEP

    192:4N7x4Qj6+W/lBUxFFMy40tlHUoroHjSo2RNWkWDBG/+5Xj+PIJ9s51Dj+7:Y7xL6D/6g0tlHUAoHGnmQgJ9qDu

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Targets

    • Target

      01313c486b99a572a9dbcbc3e01d414f11624d4e9b813a825f962b5ce66fcf64.vbs

    • Size

      230KB

    • MD5

      dfaa0731635b4e0867fb1a5b00f97cd4

    • SHA1

      0c0723a3447aa571afb33db576421a4af2dc8b86

    • SHA256

      01313c486b99a572a9dbcbc3e01d414f11624d4e9b813a825f962b5ce66fcf64

    • SHA512

      093af630e4ef2ad24ebfc088af53e5f6b6c9c88f51b6075aace72d9ce4a1de89d6825ace40eb23d7ae6c22900d1e6db04aee1544be4a701ed0c3980109fb326c

    • SSDEEP

      768:HxeMsGDC5m7QRcs7Gbs9GNjfN4Jxw9qOlFOeO2rlznJfjc:2J

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks