General

  • Target

    f1a629154f159093b39b5f24c2413e5f.bin

  • Size

    123KB

  • Sample

    230519-ck1lbsee87

  • MD5

    af5f1aa76a5a608990911e5cf4350536

  • SHA1

    b7b7e770c1f40d3d308f560d11533f8b702ad7e0

  • SHA256

    7883f82c94fd38e3943d462cb570c14bff692c82664c41f6520f4fbea9b7b3d8

  • SHA512

    f267288f6e08df9a6b3903a1d314058e4998b65744ff04fbfad0fdca46e98c63cda5adb0ffcbd2d56824e450fa0322499ae011429489863213f287706ee9b31a

  • SSDEEP

    3072:Mi5Jiy1bA11rvIRKPdpPvt7s40O1AjfEyBSADaL:MwiPbvtP/PvF0tfEyBh0

Malware Config

Targets

    • Target

      ac6fc6a98a2a3944477156cab221166f6ee535d1a9d91c66171914091af24d34.js

    • Size

      188KB

    • MD5

      f1a629154f159093b39b5f24c2413e5f

    • SHA1

      1036b4213b6ca79a86e00fc5b752fba43e3e6ad6

    • SHA256

      ac6fc6a98a2a3944477156cab221166f6ee535d1a9d91c66171914091af24d34

    • SHA512

      180b7f8b8c27cf089788d2567eec7259799f0ee4abf141e82a6036708fd3c94d50870f3345bc7997af5c54eea7a7f994e61015db6ad50030dc3c95f17ee4bab6

    • SSDEEP

      3072:9t+ZIeGK/6kbIpklgVDSxGfmuZcUZTbURC9qQ0bamCc8ovEztk:9wueGKlAklgF2GuuZcZRCfMAc84X

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • WSHRAT payload

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks