General

  • Target

    511ba3ec38b7b845f1b7406686a30d0e.bin

  • Size

    217KB

  • Sample

    230413-bpf7tage25

  • MD5

    aef6c4ad25c9e5f2441cb9de3232d495

  • SHA1

    081fcfa27186018d0c692c09338d26e810d1693b

  • SHA256

    62460706d9e322d6e6208024e56df4fe6b6f8e63f77afae5d3e41d32e8c5f207

  • SHA512

    5be911f399d2412d4736453a522a118aabfceef571d839af9424dcf4868cb91a15d0e9e0025f6baac2615330e634d2885a3b96a8da6b04cc9aa438d3489f8b94

  • SSDEEP

    6144:JvCtw2dKSYEdrsq2RX64cq3S3nGQ4oX1kWvjLzBQ:VWD49or6564cq3S3nH4IrjLzBQ

Score
10/10

Malware Config

Extracted

Family

wshrat

C2

http://harold.2waky.com:3609

Targets

    • Target

      348ad8d4b2ad2379dafa00853c8c9069b438f7121f31475ec6b0ecdca8636353.js

    • Size

      1.0MB

    • MD5

      511ba3ec38b7b845f1b7406686a30d0e

    • SHA1

      e9a6d7f6dba313a8cf19809d78bb2a4a3ae14056

    • SHA256

      348ad8d4b2ad2379dafa00853c8c9069b438f7121f31475ec6b0ecdca8636353

    • SHA512

      fc40bc304cbd47de0c792bf0d57f9769da09eea7df8c3ebe67582a403715e67e70d59e77c8dc3a1e29429a136297af619d7ba9fb5b1c348f76f138e89057f788

    • SSDEEP

      3072:MQOYUQuE6HMWYiKuVVDGnCpsFpx0iu0cKUQbStdj7:MQOwuE6FYinVVDGnCpKpx0XeStdn

    Score
    10/10
    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks