General

  • Target

    ORDER-285663-OO25331.js

  • Size

    563KB

  • Sample

    250331-v1fj7swr18

  • MD5

    cb870a9367b7dba2141abf3a067592ec

  • SHA1

    223570f201a79c3412eeee0b0a2225ded3f4e198

  • SHA256

    7bbb3b5cc257f954203a6ead2bb941b09666acff08275fd91648799b157ca122

  • SHA512

    0734fbfb61aa814f1fff537729ee28da83f74d82a4f5ee2aab9c1c4dfa179124ac17ad8d254af0e0fa445faeac515bf542b17fe47565dfe3cf8db037479ce57d

  • SSDEEP

    6144:1ivcBxisYZEXRog9zS16WF37JUBfGSZDMX:1NRYSCIzS0O3dUBVQX

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

March-25-5

C2

chongmei33.publicvm.com:2703

chongmei33.publicvm.com:7031

umarmira055.duckdns.org:2703

umarmira055.duckdns.org:7031

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %Temp%

aes.plain

Extracted

Family

wshrat

C2

http://chongmei33.myddns.rocks:7045

Targets

    • Target

      ORDER-285663-OO25331.js

    • Size

      563KB

    • MD5

      cb870a9367b7dba2141abf3a067592ec

    • SHA1

      223570f201a79c3412eeee0b0a2225ded3f4e198

    • SHA256

      7bbb3b5cc257f954203a6ead2bb941b09666acff08275fd91648799b157ca122

    • SHA512

      0734fbfb61aa814f1fff537729ee28da83f74d82a4f5ee2aab9c1c4dfa179124ac17ad8d254af0e0fa445faeac515bf542b17fe47565dfe3cf8db037479ce57d

    • SSDEEP

      6144:1ivcBxisYZEXRog9zS16WF37JUBfGSZDMX:1NRYSCIzS0O3dUBVQX

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Wshrat family

    • Async RAT payload

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks