General

  • Target

    Invoice_(PO_3078320)_EXIM-TECH.js

  • Size

    376KB

  • Sample

    240506-bjbedaca31

  • MD5

    c8fb1648a210dc192935a6e3c8f7cf18

  • SHA1

    ea948879f297cfbb8ab96ba080c4f395dbda3e53

  • SHA256

    90287f6a65069dc57e8ceac20e6c80da6afa2cab81eeb70011c1391ff1e8083f

  • SHA512

    6ed050a0c5bf0921fc4e431bfd7bdda13c4a2d7395c7a333a3255fd7ad6e815f3da55e054d5fdb930fa17c79d8d81919a241b1494fbd2ca9629323424a6a8d49

  • SSDEEP

    6144:lEaXAklgF2GuuZHi6/eMngRCEeGKjCNEaXAklgF2GuuZHi6/eMngRCEeGKjC/:Nvl029SiogKGKjCVvl029SiogKGKjC/

Malware Config

Extracted

Family

wshrat

C2

http://masterokrwh.duckdns.org:7963

Targets

    • Target

      Invoice_(PO_3078320)_EXIM-TECH.js

    • Size

      376KB

    • MD5

      c8fb1648a210dc192935a6e3c8f7cf18

    • SHA1

      ea948879f297cfbb8ab96ba080c4f395dbda3e53

    • SHA256

      90287f6a65069dc57e8ceac20e6c80da6afa2cab81eeb70011c1391ff1e8083f

    • SHA512

      6ed050a0c5bf0921fc4e431bfd7bdda13c4a2d7395c7a333a3255fd7ad6e815f3da55e054d5fdb930fa17c79d8d81919a241b1494fbd2ca9629323424a6a8d49

    • SSDEEP

      6144:lEaXAklgF2GuuZHi6/eMngRCEeGKjCNEaXAklgF2GuuZHi6/eMngRCEeGKjC/:Nvl029SiogKGKjCVvl029SiogKGKjC/

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • WSHRAT payload

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

JavaScript

1
T1059.007

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks