General

  • Target

    422e23c748359384af6ed182afe58d0b973ad4f93115836eba48dfcef940f3c3

  • Size

    732B

  • Sample

    230619-gk5bqsda4s

  • MD5

    3f713ee21a7062fa1eae05c840c897de

  • SHA1

    88234c985a55180b3d44159d2ded58aeaf11b148

  • SHA256

    012d8eced2606bdcdefddb2610900853de476651b1343de85bb86685b1f2653a

  • SHA512

    8ec657973053f426c8e17ffd083fc0fefe1f75c6fde838d331f39e14ed313d4a00ae9d2d8647a62b0b8f14024b0128a21207c5d777ef57a7d18c6f270ebd9ee0

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Targets

    • Target

      ORDER-239752_LIST.pdf.js

    • Size

      7KB

    • MD5

      c4618863b42b4299c9a6880631fafe08

    • SHA1

      264d64e779d7bfc44eaa7c62db983310db6f7a21

    • SHA256

      dbae90aa57625fe326ce1094b397a880591337c20456d87910cd900f4c69e29f

    • SHA512

      4966b2c3f7ea645d024e7b982e031f2fbe206401f57886b40416a8f559af5cb9263b59436229182abcdee851d70aed51511607e0719a687a3a75a85e27662234

    • SSDEEP

      96:0L2V3T5yigKrigvBD9D7bt1apiWwNp0IHgOfg66IJJj:F

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks