General

  • Target

    RoundTripItinerarydetails.vbs

  • Size

    780B

  • Sample

    250121-z6fjls1rgk

  • MD5

    44a1dc576cca328a09abc1747cfc6984

  • SHA1

    30edd4c5e409ed9702b2ae4a5d16c07dde4e873c

  • SHA256

    dac02b322f310cdaa789470be4bbf41fa842781a8010c06aaa346f1e87f96b72

  • SHA512

    af3d479790b667aeb268c5304f2490c8d17c669de48ecb5222c9c6c900f3c289417878af5fd5faca16bb543ae5097ae2073f10d5ea80138ff82aaa246b23e534

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

SAFEMODE

C2

BobbyMiller09.bumbleshrimp.com:1987

Mutex

cQWO7Q45k2CY

Attributes
  • delay

    3

  • install

    false

  • install_file

    srtsfsuytrrd.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      RoundTripItinerarydetails.vbs

    • Size

      780B

    • MD5

      44a1dc576cca328a09abc1747cfc6984

    • SHA1

      30edd4c5e409ed9702b2ae4a5d16c07dde4e873c

    • SHA256

      dac02b322f310cdaa789470be4bbf41fa842781a8010c06aaa346f1e87f96b72

    • SHA512

      af3d479790b667aeb268c5304f2490c8d17c669de48ecb5222c9c6c900f3c289417878af5fd5faca16bb543ae5097ae2073f10d5ea80138ff82aaa246b23e534

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks