General
-
Target
a1799891e1d46497c6aff689f8aacda09ef5e825dd700d6fce2aa3e4ddf638b6.js
-
Size
1.5MB
-
Sample
241127-dcd8sstjfx
-
MD5
54c0bfbfcf8e54a84687ad887f352661
-
SHA1
72396d5febe2bfaac6e5d32b68b7e248af5b5939
-
SHA256
a1799891e1d46497c6aff689f8aacda09ef5e825dd700d6fce2aa3e4ddf638b6
-
SHA512
61f7783c27ff34f112a721cfee73218229eedc93853b60e3544ff6f9642f7a74e77f11dfcee2f7380af34030ae4a4f84850d038d357ee0b9fb5ba9a8c3ec91a2
-
SSDEEP
12288:LtVY8xmih31uN1CJ56AmZxZYXiu5rRUSzBZK+9wmecq4uDgnA9HceADyr0RwKNCt:xVKJN4JYAL7r1jgcBObQ3K08YzmYs
Static task
static1
Behavioral task
behavioral1
Sample
a1799891e1d46497c6aff689f8aacda09ef5e825dd700d6fce2aa3e4ddf638b6.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a1799891e1d46497c6aff689f8aacda09ef5e825dd700d6fce2aa3e4ddf638b6.js
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
0.5.7B
Default-NOV-24
chongmei33.publicvm.com:2703
chongmei33.publicvm.com:7031
jinvestments.duckdns.org:2703
jinvestments.duckdns.org:7031
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Windows Update.exe
-
install_folder
%AppData%
Extracted
wshrat
http://chongmei33.publicvm.com:7044
Targets
-
-
Target
a1799891e1d46497c6aff689f8aacda09ef5e825dd700d6fce2aa3e4ddf638b6.js
-
Size
1.5MB
-
MD5
54c0bfbfcf8e54a84687ad887f352661
-
SHA1
72396d5febe2bfaac6e5d32b68b7e248af5b5939
-
SHA256
a1799891e1d46497c6aff689f8aacda09ef5e825dd700d6fce2aa3e4ddf638b6
-
SHA512
61f7783c27ff34f112a721cfee73218229eedc93853b60e3544ff6f9642f7a74e77f11dfcee2f7380af34030ae4a4f84850d038d357ee0b9fb5ba9a8c3ec91a2
-
SSDEEP
12288:LtVY8xmih31uN1CJ56AmZxZYXiu5rRUSzBZK+9wmecq4uDgnA9HceADyr0RwKNCt:xVKJN4JYAL7r1jgcBObQ3K08YzmYs
-
Asyncrat family
-
Wshrat family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1