General

  • Target

    94cedbf96e556f012c1eab9e9b82fb7f

  • Size

    951KB

  • Sample

    240206-sdjbgabdhr

  • MD5

    94cedbf96e556f012c1eab9e9b82fb7f

  • SHA1

    a2f162aac845998fda8f69f3a3874357994fe749

  • SHA256

    fe7cb98f06f1cc388f492f98af7dddb68423afd87e431d2bb36a8a68cc0d1471

  • SHA512

    9daf76cd62777d5c411479cf396fef1c9ec569cf6949e30eda3449daf6aa44b88efcbeb654fc86703fb7e015126d83c18743fbe0dc56c0d9a1708dee46f5934f

  • SSDEEP

    24576:SLqbFG0dJ0rk90xHSPJGiyLrLYzfjNOBR3jRl6aGgKEDiQsr:NAHXUzbNMR17pS

Malware Config

Targets

    • Target

      94cedbf96e556f012c1eab9e9b82fb7f

    • Size

      951KB

    • MD5

      94cedbf96e556f012c1eab9e9b82fb7f

    • SHA1

      a2f162aac845998fda8f69f3a3874357994fe749

    • SHA256

      fe7cb98f06f1cc388f492f98af7dddb68423afd87e431d2bb36a8a68cc0d1471

    • SHA512

      9daf76cd62777d5c411479cf396fef1c9ec569cf6949e30eda3449daf6aa44b88efcbeb654fc86703fb7e015126d83c18743fbe0dc56c0d9a1708dee46f5934f

    • SSDEEP

      24576:SLqbFG0dJ0rk90xHSPJGiyLrLYzfjNOBR3jRl6aGgKEDiQsr:NAHXUzbNMR17pS

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • WSHRAT payload

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks