General

  • Target

    ecb7a24fe997c5ee28816ad8bbdba6b8d3427fa26e455575b9857419d702e9c2.js

  • Size

    1.1MB

  • Sample

    240928-cfgbwstdld

  • MD5

    d0b22868d8e8452a819b4d8b80ae0292

  • SHA1

    40e687610e437bc1037979f0d5490bdab326ebe7

  • SHA256

    ecb7a24fe997c5ee28816ad8bbdba6b8d3427fa26e455575b9857419d702e9c2

  • SHA512

    b1869c132e052a772af298163b1a96785b86be1b4baf919c33390dec0e7b025998c5b58ca4479e4857e5cf97b09e2df15e2aba445dbed0db22b782f8d6f5e743

  • SSDEEP

    12288:w5oRko/g1Lnv2qqxOJQEWka0CVdfE4SeDb7bLETDA8meRaFnjCcpYVE2a7RkysUa:w9

Malware Config

Extracted

Family

wshrat

C2

http://rolla.wikaba.com:2025

Targets

    • Target

      ecb7a24fe997c5ee28816ad8bbdba6b8d3427fa26e455575b9857419d702e9c2.js

    • Size

      1.1MB

    • MD5

      d0b22868d8e8452a819b4d8b80ae0292

    • SHA1

      40e687610e437bc1037979f0d5490bdab326ebe7

    • SHA256

      ecb7a24fe997c5ee28816ad8bbdba6b8d3427fa26e455575b9857419d702e9c2

    • SHA512

      b1869c132e052a772af298163b1a96785b86be1b4baf919c33390dec0e7b025998c5b58ca4479e4857e5cf97b09e2df15e2aba445dbed0db22b782f8d6f5e743

    • SSDEEP

      12288:w5oRko/g1Lnv2qqxOJQEWka0CVdfE4SeDb7bLETDA8meRaFnjCcpYVE2a7RkysUa:w9

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks