General
-
Target
ORDER_253890-5645FD.PDF.001
-
Size
97KB
-
Sample
250328-l97wdawpz2
-
MD5
fd8b56b3605ed617f5d98e77ee381719
-
SHA1
ad519ff9506ff06dc04bd28d5f22d5f5c0721d44
-
SHA256
9ea5c3c4853cb66cb692d2f1bd8d6405ca469487e69a6bac3a83a0c1ef64d784
-
SHA512
eafaf8936d9fc8dc84ef8d7add5675861c9360ee252ea51078f1e1ea39d84563098d2d5ad2a2e4b6f967a67f61ef21716de909afdc1e49ff3f9ea481db32f57a
-
SSDEEP
1536:+nd8Mu0gM8lx8GkWSWgNN9DXhCIPFKbM7sYyZu8ZdLhCW4rVSJmhvUHnBRBRkM2k:um0SxXkW0HDXhFPob8KDZiTuHnAMkWv
Static task
static1
Behavioral task
behavioral1
Sample
ORDER_253890-5645FD.PDF.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ORDER_253890-5645FD.PDF.rar
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
ORDER_253890-5645FD.PDF.js
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ORDER_253890-5645FD.PDF.js
Resource
win10v2004-20250314-en
Malware Config
Extracted
asyncrat
0.5.7B
March-25-5
chongmei33.publicvm.com:2703
chongmei33.publicvm.com:7031
umarmira055.duckdns.org:2703
umarmira055.duckdns.org:7031
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Extracted
wshrat
http://chongmei33.myddns.rocks:7044
Targets
-
-
Target
ORDER_253890-5645FD.PDF.001
-
Size
97KB
-
MD5
fd8b56b3605ed617f5d98e77ee381719
-
SHA1
ad519ff9506ff06dc04bd28d5f22d5f5c0721d44
-
SHA256
9ea5c3c4853cb66cb692d2f1bd8d6405ca469487e69a6bac3a83a0c1ef64d784
-
SHA512
eafaf8936d9fc8dc84ef8d7add5675861c9360ee252ea51078f1e1ea39d84563098d2d5ad2a2e4b6f967a67f61ef21716de909afdc1e49ff3f9ea481db32f57a
-
SSDEEP
1536:+nd8Mu0gM8lx8GkWSWgNN9DXhCIPFKbM7sYyZu8ZdLhCW4rVSJmhvUHnBRBRkM2k:um0SxXkW0HDXhFPob8KDZiTuHnAMkWv
Score1/10 -
-
-
Target
ORDER_253890-5645FD.PDF.js
-
Size
535KB
-
MD5
930368ea6f7cd3ed52e3c11ce5a8b84b
-
SHA1
14205534d961366b4b5650a0bd751366d40e812d
-
SHA256
890ff9e6467fd6f448189cc6cf0e0f048d116b8fd289cacc6460215702b7b45e
-
SHA512
5bc116514e447a9edb47c85aa70a2f900241e3920bd8bacf374c78ee6caaa46c4525b7077ca44a69790b21189d48ae74efdd7993db1d728d09c419706c7db629
-
SSDEEP
3072:vMRy93zMk/wFRTiNy49mDvVHq07vg6fwTuP1c3TS:o82T8UJ7vg6fS0Se
-
Asyncrat family
-
Wshrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1