General

  • Target

    40d85b56e7392f84a265c3e43209112c.bin

  • Size

    824KB

  • Sample

    240505-bldyaada93

  • MD5

    03ec38ab643174de42e8014a617a0eff

  • SHA1

    9d59b0f53c2b902ecaed72256a609b0af43c8085

  • SHA256

    64a6e15edb83670237b6c80c8bb4ffae41fc1371937981561fd8a3b010ca1572

  • SHA512

    f4ef998e4b6ea81be0c0e9eed7185b7aea4f78f751ecd2b621691b1fe12c14a2c9382a3d9cb3b5e1c47be8870be7dbf74ca538fff21d265ad51dd1578535deaa

  • SSDEEP

    12288:SCSuRbzXQGRVbK/1Ml/sTJAUbwwl+gJAtiS5e21jj9txji9A5lhn:71Rbz1l/sdASwITutbe6j9T2G5/n

Malware Config

Extracted

Family

wshrat

C2

http://masterokrwh.duckdns.org:8426

Targets

    • Target

      57679766d792132497921ab478f7802f3599a8d19a9c4190045e3a139e9f2c52.js

    • Size

      2.1MB

    • MD5

      40d85b56e7392f84a265c3e43209112c

    • SHA1

      c10e1c1c487f84dbb2cf5089f473529114a89859

    • SHA256

      57679766d792132497921ab478f7802f3599a8d19a9c4190045e3a139e9f2c52

    • SHA512

      203709c65208887bdc78bc02d366ee48a04b90e7e701876416a04b98b12e01e18e5468ddb69ff018ea52816b9e4eae0787bc024cc550d2d35271191829ae7690

    • SSDEEP

      49152:gZknKnkiP2Kkaq4ePu3SomhEvQZuqCniSZae2h6ifBUw5LWrVRRNb/YopQESU3oW:w

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks