General
-
Target
ORDER_SPECIFICATION.vbe
-
Size
9KB
-
Sample
250404-hrlcwa11dx
-
MD5
2163ff1f2638a86c2dbba45713fc4035
-
SHA1
c8ff3f42afda1ff99c2c40648b28734953e3f488
-
SHA256
3fe18d06e21dcfd04304919bde713c4d980428af35ba52e02b065bbc6ae0f9b1
-
SHA512
3e7ebdbccd79ce82afde284ca6622d8dc19bb5fbe993df3232d25dd5a74cfe3993dd3df137da9bd2f4ec8611d45ea283ea7581769269e3658f70388c0b6c71b1
-
SSDEEP
192:CPo4ZlPiyZlPiLaZpv4ZGtBZxysO3O/yZGtBZxykirLaZGtBZxy+jkLDt8Xr44F9:H
Static task
static1
Malware Config
Extracted
asyncrat
0.5.7B
APR-25-2
chongmei33.publicvm.com:2703
chongmei33.publicvm.com:7031
umarmira055.duckdns.org:2703
umarmira055.duckdns.org:7031
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Extracted
wshrat
http://chongmei33.myddns.rocks:7044
Targets
-
-
Target
ORDER_SPECIFICATION.vbe
-
Size
9KB
-
MD5
2163ff1f2638a86c2dbba45713fc4035
-
SHA1
c8ff3f42afda1ff99c2c40648b28734953e3f488
-
SHA256
3fe18d06e21dcfd04304919bde713c4d980428af35ba52e02b065bbc6ae0f9b1
-
SHA512
3e7ebdbccd79ce82afde284ca6622d8dc19bb5fbe993df3232d25dd5a74cfe3993dd3df137da9bd2f4ec8611d45ea283ea7581769269e3658f70388c0b6c71b1
-
SSDEEP
192:CPo4ZlPiyZlPiLaZpv4ZGtBZxysO3O/yZGtBZxykirLaZGtBZxy+jkLDt8Xr44F9:H
-
Asyncrat family
-
Wshrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1