General
-
Target
ORDER_253890-5645FD.PDF.js
-
Size
535KB
-
Sample
250330-xvgw7axlx5
-
MD5
930368ea6f7cd3ed52e3c11ce5a8b84b
-
SHA1
14205534d961366b4b5650a0bd751366d40e812d
-
SHA256
890ff9e6467fd6f448189cc6cf0e0f048d116b8fd289cacc6460215702b7b45e
-
SHA512
5bc116514e447a9edb47c85aa70a2f900241e3920bd8bacf374c78ee6caaa46c4525b7077ca44a69790b21189d48ae74efdd7993db1d728d09c419706c7db629
-
SSDEEP
3072:vMRy93zMk/wFRTiNy49mDvVHq07vg6fwTuP1c3TS:o82T8UJ7vg6fS0Se
Static task
static1
Behavioral task
behavioral1
Sample
ORDER_253890-5645FD.PDF.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ORDER_253890-5645FD.PDF.js
Resource
win10v2004-20250314-en
Malware Config
Extracted
asyncrat
0.5.7B
March-25-5
chongmei33.publicvm.com:2703
chongmei33.publicvm.com:7031
umarmira055.duckdns.org:2703
umarmira055.duckdns.org:7031
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Extracted
wshrat
http://chongmei33.myddns.rocks:7044
Targets
-
-
Target
ORDER_253890-5645FD.PDF.js
-
Size
535KB
-
MD5
930368ea6f7cd3ed52e3c11ce5a8b84b
-
SHA1
14205534d961366b4b5650a0bd751366d40e812d
-
SHA256
890ff9e6467fd6f448189cc6cf0e0f048d116b8fd289cacc6460215702b7b45e
-
SHA512
5bc116514e447a9edb47c85aa70a2f900241e3920bd8bacf374c78ee6caaa46c4525b7077ca44a69790b21189d48ae74efdd7993db1d728d09c419706c7db629
-
SSDEEP
3072:vMRy93zMk/wFRTiNy49mDvVHq07vg6fwTuP1c3TS:o82T8UJ7vg6fS0Se
-
Asyncrat family
-
Wshrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1