General

  • Target

    Tax Returns of R58,765.js

  • Size

    990KB

  • Sample

    230517-sycdnafe88

  • MD5

    9f0fc6d60f36df9301170a6ec0d3f408

  • SHA1

    88ce1c32a1f7c18f34acf969e839ec4882e1428f

  • SHA256

    d295442674b1989fd65dea6a56081467424365f1c43ef9b74bff7fdb0f0c77ec

  • SHA512

    ddcd02d4b33bc0af4c5f4112ea7d00cef17dc56f0dd90ed8fb5ae0355ff7fb9c7a627f7f4f522954302abe27dee83dcb166f98735b5b49275810d017f2521293

  • SSDEEP

    3072:QQIC0ry/lGgq1YRZILn3cl3hkdMnmxfHtnPr:QQIC0ry/lGgq1YR7y

Score
10/10

Malware Config

Extracted

Family

wshrat

C2

http://harold.2waky.com:3609

Targets

    • Target

      Tax Returns of R58,765.js

    • Size

      990KB

    • MD5

      9f0fc6d60f36df9301170a6ec0d3f408

    • SHA1

      88ce1c32a1f7c18f34acf969e839ec4882e1428f

    • SHA256

      d295442674b1989fd65dea6a56081467424365f1c43ef9b74bff7fdb0f0c77ec

    • SHA512

      ddcd02d4b33bc0af4c5f4112ea7d00cef17dc56f0dd90ed8fb5ae0355ff7fb9c7a627f7f4f522954302abe27dee83dcb166f98735b5b49275810d017f2521293

    • SSDEEP

      3072:QQIC0ry/lGgq1YRZILn3cl3hkdMnmxfHtnPr:QQIC0ry/lGgq1YR7y

    Score
    10/10
    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks