General

  • Target

    08042025_0549_ORDER-447890-25047AP.js.rar

  • Size

    744B

  • Sample

    250408-gjedxsxrv4

  • MD5

    bf97e90db63bf0973fbe1a6db5e62f52

  • SHA1

    a13dc0dceb6c544cf3c77f54bf0fd19af144f12e

  • SHA256

    e0c47343f56c33c1ef31aecf270d7783077bb4b3384f073acd6508c1e4212cf4

  • SHA512

    27844116df0e946aa472385b2ef2b168657019ee7f4129342a637fb79ba50fc8515b4b98646c622b28a807111075c65d868ea09bd6301406dc157e432ee42332

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

APR-25-7

C2

chongmei33.publicvm.com:2703

chongmei33.publicvm.com:7031

umarmira055.duckdns.org:2703

umarmira055.duckdns.org:7031

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %Temp%

aes.plain

Extracted

Family

wshrat

C2

http://chongmei33.myddns.rocks:7044

Targets

    • Target

      ORDER-447890-25047AP.js

    • Size

      7KB

    • MD5

      9455be6935fef1fe046b9d6df6ac3cd9

    • SHA1

      5b19631ecf6c5fd49c7de7d0b5e4a0c4d6f7962b

    • SHA256

      74290592dacffc76566bd96f54da0d4a2cec1d6744f6c27ff5cbdff2eb13774a

    • SHA512

      18af68e2ee48741c82c4ea7d8d2f7c5ff58e303d72cc27e9b8e63a8461354c9b54383010ab1084e7d42ae717f8d6f418cdb986bc931fe57f2b347c6cb193cb4f

    • SSDEEP

      48:1VYfV46iVyq72+gPyryK+Gys8gP746+mq72+gPawormojZ+1ZAmojHSSfw9xVq7S:d

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Wshrat family

    • Async RAT payload

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks