General

  • Target

    e3908fd94abd2cda691d19eaeaec4bd07c6199d20e26359d3e10c0dfd26010e8

  • Size

    228KB

  • Sample

    231129-hrdysseg7z

  • MD5

    b703f09085d80c57e0f728295cda76e2

  • SHA1

    8b3abb098c870447b75fc04ce655d35d15dd45d3

  • SHA256

    e3908fd94abd2cda691d19eaeaec4bd07c6199d20e26359d3e10c0dfd26010e8

  • SHA512

    f47c509840e335dc2b6aed6165b5b1dc1e0be6a5186d0d887c0f0391a1cc755276805ef001cacad088ff0930d024cd219627207fb9d7443169bbec98589a36ba

  • SSDEEP

    6144:tSd6rsFcx7CDmLTh0Cclz/Toeyauxvgt3RCurTcHpRG:od/U7ySN0CcJojaNRC4TcJRG

Malware Config

Extracted

Family

wshrat

C2

http://snk2333.duckdns.org:47471

Targets

    • Target

      新指令.js

    • Size

      953KB

    • MD5

      21c25960399a73a630e1a4b8300d811c

    • SHA1

      86152daa4a7edfd28f8a3f3083c804204fce7033

    • SHA256

      f0962774a22adb03e29c34fda016085f1fc99598f23562e5165474469f653bd0

    • SHA512

      7f9bc1296091e91e1cea8fb5ed4ac3542edaf74b1a9854e0d546a69e92be3d31b578c58cb81c21828cd43d4e7b37936bf6cd98d5ff68ab13e5fe1740a57cabff

    • SSDEEP

      6144:XQ7Ai2LEudj0YJ404Lb2Hqoivl0WX1u4O9uziIBEJtB8ezLcbtSBYu3FC+ammFVV:gag

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks