General

  • Target

    c8f19fa9f346f7409e3bba98c1e3f058.bin

  • Size

    4KB

  • Sample

    230914-csy3gagh5v

  • MD5

    281ac5d40c5444cdbf28b4fb6c7900f9

  • SHA1

    1f8aea921d9b7d0818ba07f803e39366b93e4b24

  • SHA256

    d7f956ad3a18daaafe3a3b1b8fbb4e6707b68657934e0976441a74056380cc99

  • SHA512

    3f87c31680ad1322005562dbb92e086771a04b57a465ec64e16ddff81470e2f01e67589f249b5714df6943f4b24d3b46c96ce18de33d240695028dfa253142bc

  • SSDEEP

    96:tqEwxUIr5rH6c9phZhSSSR5Vpt+f3+tXNyAevdpWPXvgKlhjUV37qh:tLQ9rHNNrSPVCutdyAonSPlgrc

Malware Config

Extracted

Family

wshrat

C2

http://homesafe1000.duckdns.org:1604

Targets

    • Target

      645074638e8c896237a2340918cb99558103c717bbcb20a483651e6e242c5808.js

    • Size

      21KB

    • MD5

      c8f19fa9f346f7409e3bba98c1e3f058

    • SHA1

      d857192d59c0ce2196925ce59436e0e36d94b6ee

    • SHA256

      645074638e8c896237a2340918cb99558103c717bbcb20a483651e6e242c5808

    • SHA512

      cf214cd1c41ee8b42e1f1ea55d61802a1f35d89626406e02bed1874dfae15ccd24629c7ec2bf0686131691fdd8efefd4d91833afad6c3976fb908c69c4f2f326

    • SSDEEP

      384:n/+tc8v+YhrKZKZXeX5U7CP9fD0eX5GrnB63vQOaSDsvkysjqFJ8TatW8TaUxTam:n/+tbv+YhdZXeXic9fD0eXknB6Y6Dsv7

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks