General

  • Target

    daab7debd23282dcfff6640545a1ecd9

  • Size

    543KB

  • Sample

    240321-ewr5fabf57

  • MD5

    daab7debd23282dcfff6640545a1ecd9

  • SHA1

    632152a42ad5b51852e7e658ca23f89229cef117

  • SHA256

    a780f7dab7109dc4f3560fc5513a6629918a38cf33d58ca9947d08ece25e0d55

  • SHA512

    d2c4260818c3c72f9ef8a8f6f1fec320db48f40ffe947561620744a2983f34eb985eb57bd460c92b99293c46f807edc94dc87664fb8720f8204ab298552073f0

  • SSDEEP

    12288:2ZUIaUXZ2J0nOWyJbpZAi9BfkCHKj/ndlmTlSsIUucGFkPJjDjl59/HoEoBqw3Hr:2GIVi3VX3PC

Malware Config

Targets

    • Target

      daab7debd23282dcfff6640545a1ecd9

    • Size

      543KB

    • MD5

      daab7debd23282dcfff6640545a1ecd9

    • SHA1

      632152a42ad5b51852e7e658ca23f89229cef117

    • SHA256

      a780f7dab7109dc4f3560fc5513a6629918a38cf33d58ca9947d08ece25e0d55

    • SHA512

      d2c4260818c3c72f9ef8a8f6f1fec320db48f40ffe947561620744a2983f34eb985eb57bd460c92b99293c46f807edc94dc87664fb8720f8204ab298552073f0

    • SSDEEP

      12288:2ZUIaUXZ2J0nOWyJbpZAi9BfkCHKj/ndlmTlSsIUucGFkPJjDjl59/HoEoBqw3Hr:2GIVi3VX3PC

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • WSHRAT payload

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks