General

  • Target

    ORDER_SPECIFICATION.vbe

  • Size

    9KB

  • Sample

    250404-hrlcwa11dx

  • MD5

    2163ff1f2638a86c2dbba45713fc4035

  • SHA1

    c8ff3f42afda1ff99c2c40648b28734953e3f488

  • SHA256

    3fe18d06e21dcfd04304919bde713c4d980428af35ba52e02b065bbc6ae0f9b1

  • SHA512

    3e7ebdbccd79ce82afde284ca6622d8dc19bb5fbe993df3232d25dd5a74cfe3993dd3df137da9bd2f4ec8611d45ea283ea7581769269e3658f70388c0b6c71b1

  • SSDEEP

    192:CPo4ZlPiyZlPiLaZpv4ZGtBZxysO3O/yZGtBZxykirLaZGtBZxy+jkLDt8Xr44F9:H

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

APR-25-2

C2

chongmei33.publicvm.com:2703

chongmei33.publicvm.com:7031

umarmira055.duckdns.org:2703

umarmira055.duckdns.org:7031

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

wshrat

C2

http://chongmei33.myddns.rocks:7044

Targets

    • Target

      ORDER_SPECIFICATION.vbe

    • Size

      9KB

    • MD5

      2163ff1f2638a86c2dbba45713fc4035

    • SHA1

      c8ff3f42afda1ff99c2c40648b28734953e3f488

    • SHA256

      3fe18d06e21dcfd04304919bde713c4d980428af35ba52e02b065bbc6ae0f9b1

    • SHA512

      3e7ebdbccd79ce82afde284ca6622d8dc19bb5fbe993df3232d25dd5a74cfe3993dd3df137da9bd2f4ec8611d45ea283ea7581769269e3658f70388c0b6c71b1

    • SSDEEP

      192:CPo4ZlPiyZlPiLaZpv4ZGtBZxysO3O/yZGtBZxykirLaZGtBZxy+jkLDt8Xr44F9:H

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Wshrat family

    • Async RAT payload

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks