General

  • Target

    shipment docs.js

  • Size

    188KB

  • Sample

    230517-swxa2see7z

  • MD5

    f1a629154f159093b39b5f24c2413e5f

  • SHA1

    1036b4213b6ca79a86e00fc5b752fba43e3e6ad6

  • SHA256

    ac6fc6a98a2a3944477156cab221166f6ee535d1a9d91c66171914091af24d34

  • SHA512

    180b7f8b8c27cf089788d2567eec7259799f0ee4abf141e82a6036708fd3c94d50870f3345bc7997af5c54eea7a7f994e61015db6ad50030dc3c95f17ee4bab6

  • SSDEEP

    3072:9t+ZIeGK/6kbIpklgVDSxGfmuZcUZTbURC9qQ0bamCc8ovEztk:9wueGKlAklgF2GuuZcZRCfMAc84X

Malware Config

Extracted

Family

wshrat

C2

http://wshh.ourhobby.com:2084

Targets

    • Target

      shipment docs.js

    • Size

      188KB

    • MD5

      f1a629154f159093b39b5f24c2413e5f

    • SHA1

      1036b4213b6ca79a86e00fc5b752fba43e3e6ad6

    • SHA256

      ac6fc6a98a2a3944477156cab221166f6ee535d1a9d91c66171914091af24d34

    • SHA512

      180b7f8b8c27cf089788d2567eec7259799f0ee4abf141e82a6036708fd3c94d50870f3345bc7997af5c54eea7a7f994e61015db6ad50030dc3c95f17ee4bab6

    • SSDEEP

      3072:9t+ZIeGK/6kbIpklgVDSxGfmuZcUZTbURC9qQ0bamCc8ovEztk:9wueGKlAklgF2GuuZcZRCfMAc84X

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • WSHRAT payload

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks