General

  • Target

    26112024_0200_D24112509FA.js.rar

  • Size

    653KB

  • Sample

    241126-cfa5wayjcs

  • MD5

    7fef2fba8b3b0fb7e7a20171e0a4dc36

  • SHA1

    f8670314a053c1e9ebfd417407ec93684b51a065

  • SHA256

    3f46a97262f63e425b761c1df6f1ca615565f376e737a254e659a38fcc2fdf04

  • SHA512

    943b6c18eddf88838f4196874673f20e4ea00406ff084b4df5988022785689d61e8d6fe7bb08826e27361298d3d9b91329ff1a34e6d6bd67cd2a1e7f4a427ac3

  • SSDEEP

    12288:hgut8BsY1Pix0mfC0alM7j53HE1+wn8cR3KlPa2by2HIfwcA:hJ01PitfC7aj501+w8Iey2by2GC

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default-NOV-24

C2

chongmei33.publicvm.com:2703

chongmei33.publicvm.com:7031

jinvestments.duckdns.org:2703

jinvestments.duckdns.org:7031

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    Windows Update.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7044

Targets

    • Target

      D24112509FA.js

    • Size

      1.5MB

    • MD5

      54c0bfbfcf8e54a84687ad887f352661

    • SHA1

      72396d5febe2bfaac6e5d32b68b7e248af5b5939

    • SHA256

      a1799891e1d46497c6aff689f8aacda09ef5e825dd700d6fce2aa3e4ddf638b6

    • SHA512

      61f7783c27ff34f112a721cfee73218229eedc93853b60e3544ff6f9642f7a74e77f11dfcee2f7380af34030ae4a4f84850d038d357ee0b9fb5ba9a8c3ec91a2

    • SSDEEP

      12288:LtVY8xmih31uN1CJ56AmZxZYXiu5rRUSzBZK+9wmecq4uDgnA9HceADyr0RwKNCt:xVKJN4JYAL7r1jgcBObQ3K08YzmYs

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Wshrat family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks