General

  • Target

    7ff43ee5a3250008a6748ea0bdd5b6f654a84f5f766088279da1edb8b6c3c4c2

  • Size

    238KB

  • Sample

    230927-mj94gshh8y

  • MD5

    426b84f219380e3025e96ed23ea70527

  • SHA1

    8680a89ec622ab348dec019e36a6346d98a8f27a

  • SHA256

    7ff43ee5a3250008a6748ea0bdd5b6f654a84f5f766088279da1edb8b6c3c4c2

  • SHA512

    b37303b269ad2cd1a15daf4d7f3b7acda237031f118c37b29be03a514f7393b4c346b050c97cc3137c2d7214c8f96248996ee6817f68659ea06964537f808325

  • SSDEEP

    6144:/j27WkdV8aVv50d3cw5RnraADy7A4YjiV5:7271dV8aY3cWRnGA+2w

Malware Config

Extracted

Family

wshrat

C2

http://198.37.105.223:7121

Targets

    • Target

      03094991200.js

    • Size

      1.1MB

    • MD5

      c90e24e0496e0bb81d8032c74b7ed539

    • SHA1

      b5e2df79729cb47c2401e932915fd05b8469decd

    • SHA256

      a2dd5d94199f9b725b44f8dafedf9559d158f9fd0b9a445ef8b92383e445a32e

    • SHA512

      c34a8d1a27e6a0c5e215f95cf4261aa173edb304c97d869fa73568b9e3eea0bf3886a867b268389a10fed1b8dea3b0c95898a71b99215a53b8e27669a616384f

    • SSDEEP

      3072:IwALITZWIGnufMHbMJeA8PLBPWmPVJtT00YE:IwALITZWIGnufEWm9vTt

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks