General

  • Target

    08042025_0601_ORDER_INQUIRY002504.vbe.rar

  • Size

    622B

  • Sample

    250408-gw3x2sx1gy

  • MD5

    62184c52b073dc1345cf05697f91f3dc

  • SHA1

    60625bf7d13d6672e95ba07101c6abd2155e7671

  • SHA256

    29a5d97b9c2eee514eaaac4d26cb09128134d7e1baab296423f658433fef571d

  • SHA512

    b155beb34e1d3b84aa7460d8dfbf51d0ace31dcb996048641abc632d0653c61ab0beb9e38b0cc3581a4e3adcd9656b4afdb0353ff987d498cd1e57e8a3017a93

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.myddns.rocks:7044

Targets

    • Target

      ORDER_INQUIRY#002504.vbe

    • Size

      8KB

    • MD5

      5018141075d290e1bf838ceddeaa0fab

    • SHA1

      37a5d96ff98bdb465b51b922b9e193916df70e7a

    • SHA256

      d6fc2e70bf11cb4b1b12c63864458a3e9c9bb8ae8f5e37a50da90d4b88f8ece6

    • SHA512

      228902cb60b168aee5522bd9696c38a5b21bc189b4b5f1ec00612cf12fc8ae96cc486e5ad7605623a511bdfd36cc4229fda38613a98f5ff6dd1b1f9dd1de09fb

    • SSDEEP

      192:MbmQwm8r83b4x4a/Qw4uA/8r4aFE+g0aFK2ZSfgbDRbHYQwDQwrQwYjbv9F+QwHJ:ImQwmY8r4x4a/Qw4uA/Y4azg0aE2ZSfl

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Wshrat family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks