General

  • Target

    sostener.vbs

  • Size

    438KB

  • Sample

    240930-tkmg5stfpr

  • MD5

    e62e7e185f8b7c1add47167fe2f9d732

  • SHA1

    b2a17258ae76d630a78f0af855e8f098fea90147

  • SHA256

    dc5c366ec0d83b4f56c482049378ad6ff837a0160c72620edd2021e270d4572d

  • SHA512

    3cd6e2257faecceac6b8c04e9def5620f3efdbf31afd1119ecea8edffcb96adc3e21b20609077b03c7c14755830f757579c2c5b4d05a8998f65bd240312cb472

  • SSDEEP

    96:8wDsQc7lY5K8kyRllDiq0qzhELI/vlewa0bO:8wHOlY5K8kyRl9iuhYAvgwpO

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://www.alertainmediatacolombia.com/wp/wp-content/uploads/2024/09/dllsky.txt

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

dczas.duckdns.org:4455

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      sostener.vbs

    • Size

      438KB

    • MD5

      e62e7e185f8b7c1add47167fe2f9d732

    • SHA1

      b2a17258ae76d630a78f0af855e8f098fea90147

    • SHA256

      dc5c366ec0d83b4f56c482049378ad6ff837a0160c72620edd2021e270d4572d

    • SHA512

      3cd6e2257faecceac6b8c04e9def5620f3efdbf31afd1119ecea8edffcb96adc3e21b20609077b03c7c14755830f757579c2c5b4d05a8998f65bd240312cb472

    • SSDEEP

      96:8wDsQc7lY5K8kyRllDiq0qzhELI/vlewa0bO:8wHOlY5K8kyRl9iuhYAvgwpO

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks