General
-
Target
ORDER#250401-789057.pdf.js
-
Size
564KB
-
Sample
250404-hq2y8strv8
-
MD5
169562960a4143f84791abdff608d54d
-
SHA1
60170c23389a9b995bcec617ceee5ce055157859
-
SHA256
0a2b59698651ff2b7b94bc9b41fd04482eb5a2e78242227caf3c59c7ce21284b
-
SHA512
05151182885b7175993fb80eb7f688a89586db58ad7835edbbaa82585ecce29dd427a842b02a074921c2023e93f1e4f91132f6f9e160f995a2c9f778de32bd4b
-
SSDEEP
3072:AN/053WsFOT+2WoBZ6t0DXm4yLWVPmtxL87ODaqwB:AN/c3FFOTFF6ShLIOB
Static task
static1
Malware Config
Extracted
asyncrat
0.5.7B
APR-25-2
chongmei33.publicvm.com:2703
chongmei33.publicvm.com:7031
umarmira055.duckdns.org:2703
umarmira055.duckdns.org:7031
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Extracted
wshrat
http://chongmei33.myddns.rocks:7044
Targets
-
-
Target
ORDER#250401-789057.pdf.js
-
Size
564KB
-
MD5
169562960a4143f84791abdff608d54d
-
SHA1
60170c23389a9b995bcec617ceee5ce055157859
-
SHA256
0a2b59698651ff2b7b94bc9b41fd04482eb5a2e78242227caf3c59c7ce21284b
-
SHA512
05151182885b7175993fb80eb7f688a89586db58ad7835edbbaa82585ecce29dd427a842b02a074921c2023e93f1e4f91132f6f9e160f995a2c9f778de32bd4b
-
SSDEEP
3072:AN/053WsFOT+2WoBZ6t0DXm4yLWVPmtxL87ODaqwB:AN/c3FFOTFF6ShLIOB
-
Asyncrat family
-
Wshrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1