General

  • Target

    717e2c453cda45641f4be6ec62918bb1.bin

  • Size

    9KB

  • Sample

    231012-m8l3yseh4x

  • MD5

    1e9f2513d0b5dba64cfd2702def44c0f

  • SHA1

    e85afe011d324487b752da6d7ff9b1f53c624bd1

  • SHA256

    1bec3a58c2c83370601a6bca6b33ca90213d3613e03c0dce65e8a28997092ddc

  • SHA512

    a0dec8d9387c8ad57b1ea65a21b7b1343c168789d5ccb4badd1a7dd578010e3e8b3ecdba49db52c020146c12216396952c1ffa3c13a1ec8f4b916463f2ee9895

  • SSDEEP

    192:wizfrvqyGzSwTJ+ZXNqu4lY+RxsNs6GNG0voQ6R9esF1G0e6JjNDVkpfO74yV:wizDvqyG+SaMblHGC6Wvor9esW0e65Nd

Score
10/10

Malware Config

Targets

    • Target

      140802200220531MES_S Quote.exe

    • Size

      12KB

    • MD5

      1eef9f1c50a5362d4ff555b6cc5bc5df

    • SHA1

      caa4099e942052634cea6fc2866d9652f09cf546

    • SHA256

      420a2c200fde9d62bc040616edd62949aec77d6e39bf864602f584792fc8e867

    • SHA512

      56c41cf987ba22ddac2cac9ef10e3dbadf2abd99ca0ed3510883d532cc5d1625ce50426308b8e91bd20645e3812074b31b977976646d751621dd18a92b877218

    • SSDEEP

      192:nlv0pHLdF1bvM+A4tLHwpTxHR95w0J1dZdckF+syKtieOv:d+Lxbk+A4tTyFSvsyuDO

    Score
    10/10
    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • WSHRAT payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks