General

  • Target

    ORDER#250401-789057.pdf.js

  • Size

    564KB

  • Sample

    250404-hq2y8strv8

  • MD5

    169562960a4143f84791abdff608d54d

  • SHA1

    60170c23389a9b995bcec617ceee5ce055157859

  • SHA256

    0a2b59698651ff2b7b94bc9b41fd04482eb5a2e78242227caf3c59c7ce21284b

  • SHA512

    05151182885b7175993fb80eb7f688a89586db58ad7835edbbaa82585ecce29dd427a842b02a074921c2023e93f1e4f91132f6f9e160f995a2c9f778de32bd4b

  • SSDEEP

    3072:AN/053WsFOT+2WoBZ6t0DXm4yLWVPmtxL87ODaqwB:AN/c3FFOTFF6ShLIOB

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

APR-25-2

C2

chongmei33.publicvm.com:2703

chongmei33.publicvm.com:7031

umarmira055.duckdns.org:2703

umarmira055.duckdns.org:7031

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

wshrat

C2

http://chongmei33.myddns.rocks:7044

Targets

    • Target

      ORDER#250401-789057.pdf.js

    • Size

      564KB

    • MD5

      169562960a4143f84791abdff608d54d

    • SHA1

      60170c23389a9b995bcec617ceee5ce055157859

    • SHA256

      0a2b59698651ff2b7b94bc9b41fd04482eb5a2e78242227caf3c59c7ce21284b

    • SHA512

      05151182885b7175993fb80eb7f688a89586db58ad7835edbbaa82585ecce29dd427a842b02a074921c2023e93f1e4f91132f6f9e160f995a2c9f778de32bd4b

    • SSDEEP

      3072:AN/053WsFOT+2WoBZ6t0DXm4yLWVPmtxL87ODaqwB:AN/c3FFOTFF6ShLIOB

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Wshrat family

    • Async RAT payload

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks