General

  • Target

    9f0fc6d60f36df9301170a6ec0d3f408.bin

  • Size

    213KB

  • Sample

    230519-b868cadd4t

  • MD5

    8ae52a6b68c864e27d5b34d712247892

  • SHA1

    14cd5b20b3914f4e904b428cdff15167e663956d

  • SHA256

    3a44e4d4ee6f0fd68a2df9704a0876dfa0496e3c77ba51b75052f465a00a8693

  • SHA512

    5328935f14501f2f7240ac0650ea8a782c4738ce7328f5b827fee062ac7c3f704964b32ddeb0b777702801f098d18509aa25ac8abf13c9a361f9324136e81c4d

  • SSDEEP

    6144:bnW/vAOIQSL1jLrbqiqPqomaC+uu//nVzICnn:K/I9PRbqiqiVx+pF8I

Score
10/10

Malware Config

Extracted

Family

wshrat

C2

http://harold.2waky.com:3609

Targets

    • Target

      d295442674b1989fd65dea6a56081467424365f1c43ef9b74bff7fdb0f0c77ec.js

    • Size

      990KB

    • MD5

      9f0fc6d60f36df9301170a6ec0d3f408

    • SHA1

      88ce1c32a1f7c18f34acf969e839ec4882e1428f

    • SHA256

      d295442674b1989fd65dea6a56081467424365f1c43ef9b74bff7fdb0f0c77ec

    • SHA512

      ddcd02d4b33bc0af4c5f4112ea7d00cef17dc56f0dd90ed8fb5ae0355ff7fb9c7a627f7f4f522954302abe27dee83dcb166f98735b5b49275810d017f2521293

    • SSDEEP

      3072:QQIC0ry/lGgq1YRZILn3cl3hkdMnmxfHtnPr:QQIC0ry/lGgq1YR7y

    Score
    10/10
    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks