General

  • Target

    Tax Returns of R58,765.js

  • Size

    900KB

  • Sample

    230519-hfsmtafe66

  • MD5

    caf0b9b20362d1d503ede2b73907584b

  • SHA1

    e1474ab56c34ec4e13a899aae72fe095e3f54484

  • SHA256

    c121c9e47a795e1a614708fdbc9da50031623e115e7c2f25ffbdd7534da8106a

  • SHA512

    ec71950b943494f5b329c7130261c984454089b454ec4ed311f838d1e2599795921b3773347602551bae9fbf3d0b58a79280d60c20253f227cdc0f9691fbcb02

  • SSDEEP

    6144:QQ3My8GgW0/CSQK1Ap2H5xv5vjPudGSDWs5DjS/svvT1rpoCDzY9pDxaD2zXK1X5:TH

Score
10/10

Malware Config

Extracted

Family

wshrat

C2

http://harold.2waky.com:3609

Targets

    • Target

      Tax Returns of R58,765.js

    • Size

      900KB

    • MD5

      caf0b9b20362d1d503ede2b73907584b

    • SHA1

      e1474ab56c34ec4e13a899aae72fe095e3f54484

    • SHA256

      c121c9e47a795e1a614708fdbc9da50031623e115e7c2f25ffbdd7534da8106a

    • SHA512

      ec71950b943494f5b329c7130261c984454089b454ec4ed311f838d1e2599795921b3773347602551bae9fbf3d0b58a79280d60c20253f227cdc0f9691fbcb02

    • SSDEEP

      6144:QQ3My8GgW0/CSQK1Ap2H5xv5vjPudGSDWs5DjS/svvT1rpoCDzY9pDxaD2zXK1X5:TH

    Score
    10/10
    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks