General

  • Target

    116 Pax Charter Details.vbs

  • Size

    57KB

  • Sample

    220414-szqyfadcar

  • MD5

    52d94e55aac61768976f39040c288eef

  • SHA1

    e942fa64351f106b614b28e86d3a42d50e5a0443

  • SHA256

    fcd18b069a963b01f447b35ac7f12421ac36f8c577a1f19880ea0258e0505747

  • SHA512

    fe278c9483992b979e356ec4380182d7519d47144cf3ed9c9caaf0346c4bcb788272562f57264ac7a3a35bf67e9e36ac19ec5d5a07d9564a99360de77b72b717

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://textbin.net/raw/x6lfwhnyrz

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

crazydns.linkpc.net:5900

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      116 Pax Charter Details.vbs

    • Size

      57KB

    • MD5

      52d94e55aac61768976f39040c288eef

    • SHA1

      e942fa64351f106b614b28e86d3a42d50e5a0443

    • SHA256

      fcd18b069a963b01f447b35ac7f12421ac36f8c577a1f19880ea0258e0505747

    • SHA512

      fe278c9483992b979e356ec4380182d7519d47144cf3ed9c9caaf0346c4bcb788272562f57264ac7a3a35bf67e9e36ac19ec5d5a07d9564a99360de77b72b717

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Meta Stealer Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT)

    • Async RAT payload

    • Blocklisted process makes network request

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks