General

  • Target

    10042025_1526_ORDER-709856-250410AT.js.rar

  • Size

    759B

  • Sample

    250410-st7n1avyhw

  • MD5

    ad9cab58ce9d0c6952cbc4f6a74183cb

  • SHA1

    21fb395c472e8d913b6937804259de96e550cbf0

  • SHA256

    c3d858e6a9bed6193b7bbce751427703203bf0524a59fe072da87fee62b23274

  • SHA512

    532fee1b8648a1d15a018941fa4af2ce94bfab7d376d0aaef13b575347bd7b0b09c5995330ce8bfbac8641e631fe141147cdd64cf200839776bd31265895b290

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.myddns.rocks:7044

Targets

    • Target

      ORDER-709856-250410AT.js

    • Size

      7KB

    • MD5

      f59cdef1183c8bab106bc1576ba7753d

    • SHA1

      fb6420ddaee10ab75482702322acb7fb6dfb7751

    • SHA256

      1e93ac50d985016adb746750e1e53a686b3dadbe5f5dc52fd3ec9be6c9e4e384

    • SHA512

      4552376e1546208f981451ecc7387a1fd9fd7c2cdb0c980794d737a6c46cbb8f8cb4ca9542c1ffac3d7c53694b3034089a3e9dcd07a3cdc37960d0780786ad2f

    • SSDEEP

      192:JxW3IUkc9ZgGdmiFCndDvW8IL7f9WOELn0XmsWgCqIiCN9CCBCCpBCCswCCiCCgp:JxW3IUkc9ZgGdmiFCndDvW8IL7f9WOE9

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Wshrat family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v16

Tasks