General

  • Target

    jun17.vbs

  • Size

    832KB

  • Sample

    240617-nc6m6ayarg

  • MD5

    9eb84b410320b27a000a848a1c22b91c

  • SHA1

    7b84f1301c73993648f0bdf254f1fc202a12aab8

  • SHA256

    f44a15168c937d547a57015ccdf034d5f958fa9e9a159e09730b09acb17124dc

  • SHA512

    9ab878e70322df08ebe934e18b30d7b151f49a27ca99fafefa77fdd81ef3ed05700671d0e0dc22842355995fd2c5dc39442d60a9559635eda11ca17194d2d203

  • SSDEEP

    1536:gAvBzLBDsQjzNGDKJJJcSKqBtW4apIzPmdhpd:lzLBDsQjzNGDKJJJcSKqBscPmdhpd

Malware Config

Extracted

Family

wshrat

C2

http://jinvestments.duckdns.org:7044

Targets

    • Target

      jun17.vbs

    • Size

      832KB

    • MD5

      9eb84b410320b27a000a848a1c22b91c

    • SHA1

      7b84f1301c73993648f0bdf254f1fc202a12aab8

    • SHA256

      f44a15168c937d547a57015ccdf034d5f958fa9e9a159e09730b09acb17124dc

    • SHA512

      9ab878e70322df08ebe934e18b30d7b151f49a27ca99fafefa77fdd81ef3ed05700671d0e0dc22842355995fd2c5dc39442d60a9559635eda11ca17194d2d203

    • SSDEEP

      1536:gAvBzLBDsQjzNGDKJJJcSKqBtW4apIzPmdhpd:lzLBDsQjzNGDKJJJcSKqBscPmdhpd

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks