General

  • Target

    INV-23072024.vbs

  • Size

    24KB

  • Sample

    240724-jfml8sxglc

  • MD5

    34a34dad70b083609afdec67aa301d25

  • SHA1

    9d732c12eec2e360029fd11cf5fb7ce53e46aeac

  • SHA256

    b7db18ca4db36e201c612c229b392900577840e5d927f741fabf5bef839b03f6

  • SHA512

    0c90b881faae80756ebf443f90b2643e16858b2e285832f7b88d71dea96c6f7b80ef8f7966a6972d2e767ee92be69094e98778730db58de71348b315fd894ea6

  • SSDEEP

    192:qJpGsTSprrrTkrLTUJFrrMT+TGr7fTbJRr14DJzAWA2tDnHJLJIJ0JdJSJ4J6JLc:aIPIwQy8b1MtDnN

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

deopjef.duckdns.org:20245

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      INV-23072024.vbs

    • Size

      24KB

    • MD5

      34a34dad70b083609afdec67aa301d25

    • SHA1

      9d732c12eec2e360029fd11cf5fb7ce53e46aeac

    • SHA256

      b7db18ca4db36e201c612c229b392900577840e5d927f741fabf5bef839b03f6

    • SHA512

      0c90b881faae80756ebf443f90b2643e16858b2e285832f7b88d71dea96c6f7b80ef8f7966a6972d2e767ee92be69094e98778730db58de71348b315fd894ea6

    • SSDEEP

      192:qJpGsTSprrrTkrLTUJFrrMT+TGr7fTbJRr14DJzAWA2tDnHJLJIJ0JdJSJ4J6JLc:aIPIwQy8b1MtDnN

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks