General

  • Target

    ujcqhq.js

  • Size

    222KB

  • Sample

    240307-nv2rxsbd5y

  • MD5

    28a74216e1c944f071b25958d81ec47c

  • SHA1

    ae7013cf61337b4b7555c935a0113d08b50ffd00

  • SHA256

    c6b1a76af1ca382029f3d9568863f82257518852812aeeca06da4b0afecdf100

  • SHA512

    93ab441859afcd8594c64a7c65c0d4a0ca3e5a9a88c9347ebaa919853f0df9ca46be77638041b7107d311e9a670328ca8801e1f117d47d03c491a0e7b3cd770f

  • SSDEEP

    6144:tpDxmeXigeXqd1LdkiOBvRafRHFPAeRnAklgF2GuuZD:T7d1LjOJcfdTtl029q

Malware Config

Targets

    • Target

      ujcqhq.js

    • Size

      222KB

    • MD5

      28a74216e1c944f071b25958d81ec47c

    • SHA1

      ae7013cf61337b4b7555c935a0113d08b50ffd00

    • SHA256

      c6b1a76af1ca382029f3d9568863f82257518852812aeeca06da4b0afecdf100

    • SHA512

      93ab441859afcd8594c64a7c65c0d4a0ca3e5a9a88c9347ebaa919853f0df9ca46be77638041b7107d311e9a670328ca8801e1f117d47d03c491a0e7b3cd770f

    • SSDEEP

      6144:tpDxmeXigeXqd1LdkiOBvRafRHFPAeRnAklgF2GuuZD:T7d1LjOJcfdTtl029q

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • WSHRAT payload

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks