General

  • Target

    Tax Returns Of R48,765.js

  • Size

    1019KB

  • Sample

    230928-lg2tnaab6t

  • MD5

    e8536fd0f118843f3a18ec4e10831f9e

  • SHA1

    873a031c63b540b238aa8ff30d09c08b0f6c3811

  • SHA256

    08d17101c7bb382a1dc5232be50250baa228e81f56adc40a1a94c574a986c25f

  • SHA512

    a50ea7d4dd18b1f0e3614d1544736d445bbea0e44a92a6903ec86c2d06c31d05f3ce5c8cf8d5eb5de87a6ae7710327263cca845f642665cd87f13ca3e74690e5

  • SSDEEP

    6144:MQA7NcHC1yd9hSFIpgRK8VO6CbKZk+rIavG7UjcBfd82TwXtQlTrZ889unEYpcYK:X/

Score
10/10

Malware Config

Extracted

Family

wshrat

C2

http://harold.2waky.com:3609

Targets

    • Target

      Tax Returns Of R48,765.js

    • Size

      1019KB

    • MD5

      e8536fd0f118843f3a18ec4e10831f9e

    • SHA1

      873a031c63b540b238aa8ff30d09c08b0f6c3811

    • SHA256

      08d17101c7bb382a1dc5232be50250baa228e81f56adc40a1a94c574a986c25f

    • SHA512

      a50ea7d4dd18b1f0e3614d1544736d445bbea0e44a92a6903ec86c2d06c31d05f3ce5c8cf8d5eb5de87a6ae7710327263cca845f642665cd87f13ca3e74690e5

    • SSDEEP

      6144:MQA7NcHC1yd9hSFIpgRK8VO6CbKZk+rIavG7UjcBfd82TwXtQlTrZ889unEYpcYK:X/

    Score
    10/10
    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks