General

  • Target

    bc0078eddf96041937071aa21a514385275768fd1efef78196c73df4efd76b6d_JC.img

  • Size

    1.2MB

  • Sample

    231012-pcn9jsbe85

  • MD5

    717e2c453cda45641f4be6ec62918bb1

  • SHA1

    83a599cfc0d7de4c978142c5d02187293fdb592d

  • SHA256

    bc0078eddf96041937071aa21a514385275768fd1efef78196c73df4efd76b6d

  • SHA512

    350ede154f652fb4dfd29cde971d531ccee06882bd3dd3c03e92e09fa6d3dc4fbdf0a5b632d264eaf1646c20942ddff5cee8f1c26d226b90346e109439efda14

  • SSDEEP

    192:aBzfWlv0pHLdF1bvM+A4tLHwpTxHR95w0J1dZdckF+syKtieOv:OG+Lxbk+A4tTyFSvsyuDO

Score
10/10

Malware Config

Targets

    • Target

      14080220.EXE

    • Size

      12KB

    • MD5

      1eef9f1c50a5362d4ff555b6cc5bc5df

    • SHA1

      caa4099e942052634cea6fc2866d9652f09cf546

    • SHA256

      420a2c200fde9d62bc040616edd62949aec77d6e39bf864602f584792fc8e867

    • SHA512

      56c41cf987ba22ddac2cac9ef10e3dbadf2abd99ca0ed3510883d532cc5d1625ce50426308b8e91bd20645e3812074b31b977976646d751621dd18a92b877218

    • SSDEEP

      192:nlv0pHLdF1bvM+A4tLHwpTxHR95w0J1dZdckF+syKtieOv:d+Lxbk+A4tTyFSvsyuDO

    Score
    10/10
    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • WSHRAT payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks