General

  • Target

    bfffba7e6f2b39c8c465c75738d3393bffa25873f0ce255183deada13c04fe29

  • Size

    528KB

  • Sample

    230718-lvcfxshd84

  • MD5

    dcc686cb21dfa32e9de87a6d8e7456fb

  • SHA1

    00d1b251532dcb72ac2053df95342402f5694478

  • SHA256

    bfffba7e6f2b39c8c465c75738d3393bffa25873f0ce255183deada13c04fe29

  • SHA512

    a39320b0c28581ac7fd37ccdd11ed00143ef421d397bde698a5cfd9955ff0ca2153a73bb69b001699db23c19cd9fd941007e9234a13ee510f67a9ccd602d24f3

  • SSDEEP

    12288:aFqCpVo8XtPVn4LWXzm+gBuISj4ttT/SLs7jzG01s6siESyHQT58SkErYGELLyQl:8pC+b6Ewb/3

Malware Config

Extracted

Family

wshrat

C2

http://45.90.222.131:7121

Targets

    • Target

      bfffba7e6f2b39c8c465c75738d3393bffa25873f0ce255183deada13c04fe29

    • Size

      528KB

    • MD5

      dcc686cb21dfa32e9de87a6d8e7456fb

    • SHA1

      00d1b251532dcb72ac2053df95342402f5694478

    • SHA256

      bfffba7e6f2b39c8c465c75738d3393bffa25873f0ce255183deada13c04fe29

    • SHA512

      a39320b0c28581ac7fd37ccdd11ed00143ef421d397bde698a5cfd9955ff0ca2153a73bb69b001699db23c19cd9fd941007e9234a13ee510f67a9ccd602d24f3

    • SSDEEP

      12288:aFqCpVo8XtPVn4LWXzm+gBuISj4ttT/SLs7jzG01s6siESyHQT58SkErYGELLyQl:8pC+b6Ewb/3

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • WSHRAT payload

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks