General

  • Target

    fad0c2df718c20c0615e237b5da75f6e93a867d7168921a6af3afb41834b4d05.js

  • Size

    7KB

  • Sample

    240529-njlxbsdf38

  • MD5

    8a006c1466998c2bde5fa110296bf4da

  • SHA1

    38f5819efe2bfece434ff9de7ce327ad1dab920a

  • SHA256

    fad0c2df718c20c0615e237b5da75f6e93a867d7168921a6af3afb41834b4d05

  • SHA512

    f90be849f383d9919c8463b4041d1e89a4de5e47cf9ef1dcb21f8af0d326857ce45e75c7100aed1c217b885a077001cfa50bb7489144f5f010e84b20c3d19ece

  • SSDEEP

    96:p8KvZU3TRRkyPWXsy7jZRZcmq74qe0tJLgy0c15Q:rsTRAL/ure0tFgc8

Malware Config

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Targets

    • Target

      fad0c2df718c20c0615e237b5da75f6e93a867d7168921a6af3afb41834b4d05.js

    • Size

      7KB

    • MD5

      8a006c1466998c2bde5fa110296bf4da

    • SHA1

      38f5819efe2bfece434ff9de7ce327ad1dab920a

    • SHA256

      fad0c2df718c20c0615e237b5da75f6e93a867d7168921a6af3afb41834b4d05

    • SHA512

      f90be849f383d9919c8463b4041d1e89a4de5e47cf9ef1dcb21f8af0d326857ce45e75c7100aed1c217b885a077001cfa50bb7489144f5f010e84b20c3d19ece

    • SSDEEP

      96:p8KvZU3TRRkyPWXsy7jZRZcmq74qe0tJLgy0c15Q:rsTRAL/ure0tFgc8

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

JavaScript

1
T1059.007

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks