General

  • Target

    38bd5894a8e1c294b4ea9f3809a1bb7d987af8db390063603c2fca96df2a77bf.zip

  • Size

    159KB

  • Sample

    231230-sqztzscec4

  • MD5

    5e6b24b8800ba22c8c778bf6c06fdbad

  • SHA1

    eb09a7033955cbd2517c45b2277f923f3dabf8ea

  • SHA256

    795a5fad26bf022360bdb88d73d356037f0f644fd23c899f88547fa9552c6759

  • SHA512

    e594884a2a85de3694f1f259cb39c3de89904df6a2c1552664d0f7bb479338784147bc68c620e646d87053d3fe26b6264f03f2ceb03e8fd3879743b7100230ee

  • SSDEEP

    3072:X+tJI7T4fPxO7Aidy22laKxQ168C+Yeqz81VKulcBBjq4gkyqPpwGtY0utrs/:X2JI7c3QAky9xXWYeqI10ulm9nyqPCGX

Malware Config

Extracted

Family

wshrat

C2

http://poseidon99.duckdns.org:4758

Targets

    • Target

      38bd5894a8e1c294b4ea9f3809a1bb7d987af8db390063603c2fca96df2a77bf.vbs

    • Size

      254KB

    • MD5

      bfb4e820b764be9c6ca3a7be5afdc124

    • SHA1

      21e8d148050fa80830ee64cbf99d67292a21fabc

    • SHA256

      38bd5894a8e1c294b4ea9f3809a1bb7d987af8db390063603c2fca96df2a77bf

    • SHA512

      506a151144d5323156066d1a746bd3d9e14b99a170d1e89d9424a5a98dd05a794ab0aa32766b073f58ad866716ef25972b3a44a9d56fad80003c0abf13ced27f

    • SSDEEP

      6144:ywKmqM4d6gb5mjTS8EoL36Uc2TEspbmWVX7FilDCtzQbxkGsg5:QdeTSWdI8mWVM+OGHs

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks