General

  • Target

    08042025_1104_ORDER_00250490-6758AT.vbe.rar

  • Size

    624B

  • Sample

    250408-nalj7stly9

  • MD5

    081b556943cd55be0c16f8ed7bb25d09

  • SHA1

    4af80e37173d6d761139ac33136fb31d8958e84e

  • SHA256

    75297c1069dd41c89723f726d37d6800acf79e29b0f3020e3149cd17ee6dbf85

  • SHA512

    2e322b92ce9c8c0a8fed8a876817d4bcd93b0cbb8066f6bfd68500a261fa758d7031422252358b40d9885321b5663aa6bd6d7bc5ddca1da0b4e4231ba1f559de

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.myddns.rocks:7044

Targets

    • Target

      ORDER_#00250490-6758AT.vbe

    • Size

      8KB

    • MD5

      5018141075d290e1bf838ceddeaa0fab

    • SHA1

      37a5d96ff98bdb465b51b922b9e193916df70e7a

    • SHA256

      d6fc2e70bf11cb4b1b12c63864458a3e9c9bb8ae8f5e37a50da90d4b88f8ece6

    • SHA512

      228902cb60b168aee5522bd9696c38a5b21bc189b4b5f1ec00612cf12fc8ae96cc486e5ad7605623a511bdfd36cc4229fda38613a98f5ff6dd1b1f9dd1de09fb

    • SSDEEP

      192:MbmQwm8r83b4x4a/Qw4uA/8r4aFE+g0aFK2ZSfgbDRbHYQwDQwrQwYjbv9F+QwHJ:ImQwmY8r4x4a/Qw4uA/Y4azg0aE2ZSfl

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Wshrat family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v16

Tasks