General

  • Target

    ORDER-25013-67789543AX.vbs

  • Size

    20KB

  • Sample

    250415-l7vg9sv1et

  • MD5

    6b05858262470682bdc3297c6641a3db

  • SHA1

    699d8a5aa6e559cc597db68a9125d804f1350b8a

  • SHA256

    aba8289d1eacae0e2eac939d757b19a576667e4eb47c1d86cbee0ad73f0b3e1a

  • SHA512

    41d2694de39c242c7333ee7e49024229f05fc57ec0b0bd587c98155a6c24a4a72b50b56e4ae9c7a4dfe415923e0796ec53e77e11a7932a30c551a457a560c298

  • SSDEEP

    192:dXPjbMX56FswxMD3AiUAGYsfOnqY6Cw6iO/D4nDSIfwAM65/ZBhb38mBuaZL1xFp:9LwXllDA0GCw6iOb0jf3xTYmBzxFBIw

Malware Config

Extracted

Family

wshrat

C2

http://lee44.kozow.com:6892

Targets

    • Target

      ORDER-25013-67789543AX.vbs

    • Size

      20KB

    • MD5

      6b05858262470682bdc3297c6641a3db

    • SHA1

      699d8a5aa6e559cc597db68a9125d804f1350b8a

    • SHA256

      aba8289d1eacae0e2eac939d757b19a576667e4eb47c1d86cbee0ad73f0b3e1a

    • SHA512

      41d2694de39c242c7333ee7e49024229f05fc57ec0b0bd587c98155a6c24a4a72b50b56e4ae9c7a4dfe415923e0796ec53e77e11a7932a30c551a457a560c298

    • SSDEEP

      192:dXPjbMX56FswxMD3AiUAGYsfOnqY6Cw6iO/D4nDSIfwAM65/ZBhb38mBuaZL1xFp:9LwXllDA0GCw6iOb0jf3xTYmBzxFBIw

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Wshrat family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v16

Tasks