General

  • Target

    8dcc2c7236870e00097d09cadc066b03.bin

  • Size

    159KB

  • Sample

    240504-bzkmzsch34

  • MD5

    d881b196a197d7506b7bbeffdab35f27

  • SHA1

    52efd1ec2a6b9816357bbaa006c2efdf2f941c81

  • SHA256

    f2ba66e2e18a13528324d57b98a84c2ec02f3893de90f9fb34be7ab0445c8166

  • SHA512

    bafbe5d52ee82dd7bf8fc5a2d446a1b002f8823b0305332cd48ee956301f56c880e45c400f1582b630f69e2a00150fd4345adf12012d8dbf6c3bca6923b2b1c1

  • SSDEEP

    3072:y9V2RrL9ybkPSNRqwZEe/OuyACqcq86xJd74fosRn2AkKXPpxbHha:yerhtIRqw+luyAaD6ho72tKfta

Malware Config

Extracted

Family

wshrat

C2

http://masterokrwh.duckdns.org:8426

Targets

    • Target

      d968cf117419570bc67f57a2be52a648d2253346fd60489c06435fdbe518c61e.js

    • Size

      615KB

    • MD5

      8dcc2c7236870e00097d09cadc066b03

    • SHA1

      2c9868c25000e2d7801dc9fd431d6ba99b694e16

    • SHA256

      d968cf117419570bc67f57a2be52a648d2253346fd60489c06435fdbe518c61e

    • SHA512

      918ee5a3a83fcbc098b294077c0fd5888ccc05e0785ef749c788be763ddd2750fe6daa67904b9de2d77cdb9dfab4dc7b65db25e1c18ab5d33f969e81fdae9cf5

    • SSDEEP

      12288:fYeIrWr/qRigAyX/kngXFbjTLvaH28nZH19Iimg0VtxWvTbxzOObcizI/mofdEMp:fYeIrWr/qRigAyX/kngXFbjTLvaH28ng

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks