May 31, 2024, 4:40 p.m. | ptwistedworld

System Weakness - Medium systemweakness.com

Hi, today I’ll detail down how I analyzed a WSH RAT sample in the form JavaScript. I acquired it in MalwareBazaar here https://bazaar.abuse.ch/sample/fad0c2df718c20c0615e237b5da75f6e93a867d7168921a6af3afb41834b4d05/ that was last uploaded on May 28, 2024.

Looking at the script we can immediately see that this is obfuscated so there’s really not much we can understand here other than the fact it has declared a variable “Q2a” that is equals to 28024695 and another variable “HIQPNL” declaring a bunch of strings minus Q2a.

What we’ll …

cyberchef cybersecurity javascript malware analysis security

Data Loss Prevention Analyst 1

@ Advanced Energy | Quezon City, 00, PH, n/a

TC-CS-DPP MS Purview-Staff

@ EY | Bengaluru, KA, IN, 560048

Consultant CSIRT Confirmé H/F (Paris)

@ EY | Paris La Défense, FR, 92037

Consultant Azure Cloud Sécurité CSPM H/F (Paris)

@ EY | Paris La Défense, FR, 92037

Consultant en Protection des Données (Microsoft Purview) H/F (Paris)

@ EY | Paris La Défense, FR, 92037

Business Continuity Coordinator

@ Sumitomo Mitsui Banking Corporation | Brea, CA, US, 92821