General
-
Target
08042025_0549_ORDER-447890-25047AP.js.rar
-
Size
744B
-
Sample
250408-gjedxsxrv4
-
MD5
bf97e90db63bf0973fbe1a6db5e62f52
-
SHA1
a13dc0dceb6c544cf3c77f54bf0fd19af144f12e
-
SHA256
e0c47343f56c33c1ef31aecf270d7783077bb4b3384f073acd6508c1e4212cf4
-
SHA512
27844116df0e946aa472385b2ef2b168657019ee7f4129342a637fb79ba50fc8515b4b98646c622b28a807111075c65d868ea09bd6301406dc157e432ee42332
Static task
static1
Malware Config
Extracted
asyncrat
0.5.7B
APR-25-7
chongmei33.publicvm.com:2703
chongmei33.publicvm.com:7031
umarmira055.duckdns.org:2703
umarmira055.duckdns.org:7031
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Extracted
wshrat
http://chongmei33.myddns.rocks:7044
Targets
-
-
Target
ORDER-447890-25047AP.js
-
Size
7KB
-
MD5
9455be6935fef1fe046b9d6df6ac3cd9
-
SHA1
5b19631ecf6c5fd49c7de7d0b5e4a0c4d6f7962b
-
SHA256
74290592dacffc76566bd96f54da0d4a2cec1d6744f6c27ff5cbdff2eb13774a
-
SHA512
18af68e2ee48741c82c4ea7d8d2f7c5ff58e303d72cc27e9b8e63a8461354c9b54383010ab1084e7d42ae717f8d6f418cdb986bc931fe57f2b347c6cb193cb4f
-
SSDEEP
48:1VYfV46iVyq72+gPyryK+Gys8gP746+mq72+gPawormojZ+1ZAmojHSSfw9xVq7S:d
-
Asyncrat family
-
Wshrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1