Resubmissions

09/05/2024, 08:14

240509-j47bjsbd99 10

09/05/2024, 08:01

240509-jwpfrsbb83 10

General

  • Target

    MALICIOUS.wsf

  • Size

    268KB

  • Sample

    240509-jwpfrsbb83

  • MD5

    025d83a734e8c6662150026387094018

  • SHA1

    414f633540752761c2d662c276870b2cd9504977

  • SHA256

    c556f4ab2685326454234db7e67adfe7d78ce298deebe354a32c4091ea4eace1

  • SHA512

    c7ccc002fa81928eb0e6affdc4baef9dc090301a18d09ac1fe4cf7401d7fdcd826d2d34107794b821c273c12de8da827fef3316e14508928756bc9e89b197e0e

  • SSDEEP

    3072:1lelelelelelAlelelelelel7lelelelelelnlElelelelelelElelelelelelAX:6

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://world1.webredirect.org:770/1001.jpg

Extracted

Family

asyncrat

Version

AWS | 3Losh

Botnet

PORT=1001

C2

world1.webredirect.org:1001

Mutex

AsyncMutex_a1001

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      MALICIOUS.wsf

    • Size

      268KB

    • MD5

      025d83a734e8c6662150026387094018

    • SHA1

      414f633540752761c2d662c276870b2cd9504977

    • SHA256

      c556f4ab2685326454234db7e67adfe7d78ce298deebe354a32c4091ea4eace1

    • SHA512

      c7ccc002fa81928eb0e6affdc4baef9dc090301a18d09ac1fe4cf7401d7fdcd826d2d34107794b821c273c12de8da827fef3316e14508928756bc9e89b197e0e

    • SSDEEP

      3072:1lelelelelelAlelelelelel7lelelelelelnlElelelelelelElelelelelelAX:6

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks