General

  • Target

    m_Specifications-wsl.xz

  • Size

    122KB

  • Sample

    231012-h4rqesdd9z

  • MD5

    7d9f24061632d5e5cf29ec219448936d

  • SHA1

    d6c5d8c13adc5abdb6512f89efafe595e5c45509

  • SHA256

    6faebe3013cd3f48b7c2e3a2fdabb0a412ce18331a27457ec513058b51af9036

  • SHA512

    f88159be554348419d6edd410702a8c99e578527d917b99650bd5732ca28eb10b10142323da03948e3a55dbcbae845b25560a57bafe88f18cf6301ee0d6efa1d

  • SSDEEP

    3072:AQC+HuJ38ZKVsHAKlTKbOmefkPB2w8cY6TRvTDRx9nfe5H:A1+OKY2gWult2w8cY6TNDRI

Malware Config

Targets

    • Target

      invoice-wsl.js

    • Size

      187KB

    • MD5

      bc0356063536ebe0867a97a1965a0f52

    • SHA1

      f127953be621382ff50a37ebecef4d17bb3cd7d2

    • SHA256

      197e07455f8920039c0a30b9c95f847e02d29c9d7bd50488a350b53e747ba9c5

    • SHA512

      40f1d16054d103b4f9be044c9cb34f73fb042a62ea29e205f13a4f0b2565dbaa3e9d7954e9d288a748a125495891c2ed2f19104e5fc1353c745879e16ca02565

    • SSDEEP

      3072:2aeGK/6dbIpklgVDSxGfmuZRTFBTEsSQ0bamOZkvEzzbURC8:2aeGKgAklgF2GuuZ7auMTFRC8

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • WSHRAT payload

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks