General

  • Target

    03042025_1512_ORDER-018654-002504.js.rar

  • Size

    688B

  • Sample

    250403-slg4da1kx6

  • MD5

    6099cfb17e4c277112f03c9eaaa1ff83

  • SHA1

    27dc71b70253d163a25c5e20ba8643600107a5d6

  • SHA256

    64c2f298397f7727b46c17ced5a4e4b1b719dcb52a47dc8e50ef5e6237feba22

  • SHA512

    3cba87ed35334f7f3298b2d0082108b686d7d63e7b25431cd7daff0c61cb2febe757c44ae45ae5f481457f9e4af26362d1fc860d813998bf66fa7b599dc9b6b9

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

lee44.kozow.com:4869

lee44.kozow.com:50472

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    audiondg.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

wshrat

C2

http://lee44.kozow.com:6892

Targets

    • Target

      ORDER-018654-002504.js

    • Size

      6KB

    • MD5

      7352df5a14aecba54ac07136a27f96e6

    • SHA1

      44a686b3acdeae3d0c704d8dc2618d31029c2fee

    • SHA256

      60667b8d0b8ed46c3b023dfec70fad2f24cb4bdd15060db90e6176e67ca09c76

    • SHA512

      4b89b36c30d5f3d0482300d5726d7eea8a283a930f2e959f9b15d37a04ba69a96ab9038da6159014b312e32f3d9cf8556369542efc16b72e7cb1b59feb60587b

    • SSDEEP

      96:wxjwyH4VwotBhKk5a7wof1AwwyHkps6iAaqg3BBi7o2XqwyH5RTuptSupKqupcak:1o9XUGPIYGiU8gh

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Wshrat family

    • Async RAT payload

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks