General

  • Target

    Scan005.js

  • Size

    1019KB

  • Sample

    230519-hs7mhaee4w

  • MD5

    f05dd469447e50abf638af13d0563d54

  • SHA1

    9c0f3e6b8177c08d066c7696c6bd77c8614fc1db

  • SHA256

    659d0615a525282de8d22cd7846442d257dcd1a33e6c6c941d530704954afaf2

  • SHA512

    f76d89d7fd33d36aad977e80eca35d5deaf305e617d45cc453737b8aff9f4aa8d01cb0eded655bc0b0c8dbd485e2cd9e3bd86965bab64fb8e241281e83c7039f

  • SSDEEP

    3072:MoZBzWlRm4PuQlGdJkj8qnGBIQggpd0AD:MoZBzWlRm4PuQlGdJLd

Malware Config

Extracted

Family

wshrat

C2

http://45.90.222.125:7121

Targets

    • Target

      Scan005.js

    • Size

      1019KB

    • MD5

      f05dd469447e50abf638af13d0563d54

    • SHA1

      9c0f3e6b8177c08d066c7696c6bd77c8614fc1db

    • SHA256

      659d0615a525282de8d22cd7846442d257dcd1a33e6c6c941d530704954afaf2

    • SHA512

      f76d89d7fd33d36aad977e80eca35d5deaf305e617d45cc453737b8aff9f4aa8d01cb0eded655bc0b0c8dbd485e2cd9e3bd86965bab64fb8e241281e83c7039f

    • SSDEEP

      3072:MoZBzWlRm4PuQlGdJkj8qnGBIQggpd0AD:MoZBzWlRm4PuQlGdJLd

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks