General

  • Target

    8B6A61F9E22244F006E883033CB69DA1BDF6245B60FECFEFF27A8D3B60F57CC3

  • Size

    7KB

  • Sample

    230518-cfyk6sgc9v

  • MD5

    00657052ad9cdcb9ca9f4c3ea9a10c5f

  • SHA1

    2f849694aee29cc1e45e21b6b90a09f179d14697

  • SHA256

    8b6a61f9e22244f006e883033cb69da1bdf6245b60fecfeff27a8d3b60f57cc3

  • SHA512

    294a65f515cbdebf769ffcf19857056c2344116ef19686e1153ab7270b2cbbd8176fa57600f52c4d734bb6f2135aad479a75f38e53ee3cfbd257125c79b8114b

  • SSDEEP

    192:HMev2rk+4aIBS/jKGZ4D81cbPua2QeEJhpinaKyRGtlcaQr:Ht2cRA7KGtcLuk7hpinfQSP0

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Targets

    • Target

      ORDER_230322.vbs

    • Size

      250KB

    • MD5

      2a76503660d140d0aa08bd758cb9c29c

    • SHA1

      55c1ba23321e11c0298450fb9dfa1ccebdea2d86

    • SHA256

      5f0329e51f347ca573ea69cd865bb03d0526d9e9e91477a4502a9fe35c3fbddf

    • SHA512

      f50da5213bf53b02199a2d3c5c8d06643315bd939b5047bfe44a904b8cb45be22793155f9055e9529c3ebd1861d14ae39528a9914e841ab3a91c6540c29b7390

    • SSDEEP

      768:19C8cPTeUGV5V4ky1rHHPskYROOowLXMJuzHHMH+HCo/LiGi2tl33xRXC:yR

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks