General

  • Target

    invoice.vbs

  • Size

    19KB

  • Sample

    240323-xjzmvsde2y

  • MD5

    433febbbc8e5d0eeed7b3aaa9ad15558

  • SHA1

    83905f45e2c6977f35e7db522052295d739fd667

  • SHA256

    25b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e

  • SHA512

    6cae2f6e7b86052af6f812e815128f67ce76f44e56b9bfdb5e4fa0ce2fba5610deb830334162b330e5e494bece380d1f7e053f6f89eac398d48fe49cbb3626ec

  • SSDEEP

    384:vKNssJiGagRYwZSFFOECXCghDStXdTX2XXXiXs31TNWE/cJ1:vq9agRYwZSGECXCgM7rGHqc1IE/m

Malware Config

Extracted

Family

wshrat

C2

http://paulrdp02.duckdns.org:1604

Targets

    • Target

      invoice.vbs

    • Size

      19KB

    • MD5

      433febbbc8e5d0eeed7b3aaa9ad15558

    • SHA1

      83905f45e2c6977f35e7db522052295d739fd667

    • SHA256

      25b4135b1c971889bcf7b36da063ea24025e2a67e22b3dd84ebb8f556b75823e

    • SHA512

      6cae2f6e7b86052af6f812e815128f67ce76f44e56b9bfdb5e4fa0ce2fba5610deb830334162b330e5e494bece380d1f7e053f6f89eac398d48fe49cbb3626ec

    • SSDEEP

      384:vKNssJiGagRYwZSFFOECXCghDStXdTX2XXXiXs31TNWE/cJ1:vq9agRYwZSGECXCgM7rGHqc1IE/m

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks