General

  • Target

    invoice-wsl.js

  • Size

    187KB

  • Sample

    230923-jx9s4adh6z

  • MD5

    bc0356063536ebe0867a97a1965a0f52

  • SHA1

    f127953be621382ff50a37ebecef4d17bb3cd7d2

  • SHA256

    197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5

  • SHA512

    40f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565

  • SSDEEP

    3072:2aeGK/6dbIpklgVDSxGfmuZRTFBTEsSQ0bamOZkvEzzbURC8:2aeGKgAklgF2GuuZ7auMTFRC8

Malware Config

Targets

    • Target

      invoice-wsl.js

    • Size

      187KB

    • MD5

      bc0356063536ebe0867a97a1965a0f52

    • SHA1

      f127953be621382ff50a37ebecef4d17bb3cd7d2

    • SHA256

      197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5

    • SHA512

      40f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565

    • SSDEEP

      3072:2aeGK/6dbIpklgVDSxGfmuZRTFBTEsSQ0bamOZkvEzzbURC8:2aeGKgAklgF2GuuZ7auMTFRC8

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • WSHRAT payload

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks