General

  • Target

    MV BMC ENDORA V0123- PDA.js

  • Size

    128KB

  • Sample

    230113-kwp8qsbe3v

  • MD5

    3a084e6817bf9b361b8ff6618d767c09

  • SHA1

    f27662987fd14d69523efec560e29c1d66a2a645

  • SHA256

    cee54813009042b01b4ebd1afbf99160b0c25465b7530332ba5bb064be6eba63

  • SHA512

    a49b1732ea52aff5cdf57b10ef8c46c5185805ed13a6d032b5cc0aa326a4101aa6744ac12732ed5f8c87e9ad39d8b7da8b31a4c2208eb79c97db6c9e94b0fd11

  • SSDEEP

    3072:ool0yHnHmo2BPDf/DUGOxxVZh/O5kaUH02x2RVy:ogHmouPDf/DnYhmhPRVy

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

84.21.172.33:6606

84.21.172.33:7707

84.21.172.33:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    Recycle Bin.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      MV BMC ENDORA V0123- PDA.js

    • Size

      128KB

    • MD5

      3a084e6817bf9b361b8ff6618d767c09

    • SHA1

      f27662987fd14d69523efec560e29c1d66a2a645

    • SHA256

      cee54813009042b01b4ebd1afbf99160b0c25465b7530332ba5bb064be6eba63

    • SHA512

      a49b1732ea52aff5cdf57b10ef8c46c5185805ed13a6d032b5cc0aa326a4101aa6744ac12732ed5f8c87e9ad39d8b7da8b31a4c2208eb79c97db6c9e94b0fd11

    • SSDEEP

      3072:ool0yHnHmo2BPDf/DUGOxxVZh/O5kaUH02x2RVy:ogHmouPDf/DnYhmhPRVy

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Async RAT payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks