General

  • Target

    ID-PCTS8435.js

  • Size

    2KB

  • Sample

    241115-xe1z5aymgw

  • MD5

    9881a8b65b41433a8d7a3bb68f382e94

  • SHA1

    5d7b75c19bf11e1a3996a83258030759344d67b1

  • SHA256

    0909faba191b7f68cc08f8fc4c4adeb91224086fdd79ce5b050811747afd00ce

  • SHA512

    7c555e960b1c9e9e8b3d89ce68b7dc1cdc230afcb3ca6cbab22f92aa72ac1e3a7a16a17e1725580f33dd8fa136ad3d7c350fd2d4e20c9378f28b46b8112c7080

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://66.206.25.2/1/text.txt

Extracted

Language
ps1
Source
URLs
exe.dropper

http://66.206.25.2/1/text.txt

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

TNWork

C2

tnwork.kozow.com:5566

Mutex

AsyncMutex_6SI8fhjfhj

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      ID-PCTS8435.js

    • Size

      2KB

    • MD5

      9881a8b65b41433a8d7a3bb68f382e94

    • SHA1

      5d7b75c19bf11e1a3996a83258030759344d67b1

    • SHA256

      0909faba191b7f68cc08f8fc4c4adeb91224086fdd79ce5b050811747afd00ce

    • SHA512

      7c555e960b1c9e9e8b3d89ce68b7dc1cdc230afcb3ca6cbab22f92aa72ac1e3a7a16a17e1725580f33dd8fa136ad3d7c350fd2d4e20c9378f28b46b8112c7080

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks