General

  • Target

    08042025_1104_ORDER_#00250490-6758AT.vbe.rar

  • Size

    624B

  • Sample

    250408-m6q9wsttdw

  • MD5

    081b556943cd55be0c16f8ed7bb25d09

  • SHA1

    4af80e37173d6d761139ac33136fb31d8958e84e

  • SHA256

    75297c1069dd41c89723f726d37d6800acf79e29b0f3020e3149cd17ee6dbf85

  • SHA512

    2e322b92ce9c8c0a8fed8a876817d4bcd93b0cbb8066f6bfd68500a261fa758d7031422252358b40d9885321b5663aa6bd6d7bc5ddca1da0b4e4231ba1f559de

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

APR-25-7

C2

chongmei33.publicvm.com:2703

chongmei33.publicvm.com:7031

umarmira055.duckdns.org:2703

umarmira055.duckdns.org:7031

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %Temp%

aes.plain

Extracted

Family

wshrat

C2

http://chongmei33.myddns.rocks:7044

Targets

    • Target

      ORDER_#00250490-6758AT.vbe

    • Size

      8KB

    • MD5

      5018141075d290e1bf838ceddeaa0fab

    • SHA1

      37a5d96ff98bdb465b51b922b9e193916df70e7a

    • SHA256

      d6fc2e70bf11cb4b1b12c63864458a3e9c9bb8ae8f5e37a50da90d4b88f8ece6

    • SHA512

      228902cb60b168aee5522bd9696c38a5b21bc189b4b5f1ec00612cf12fc8ae96cc486e5ad7605623a511bdfd36cc4229fda38613a98f5ff6dd1b1f9dd1de09fb

    • SSDEEP

      192:MbmQwm8r83b4x4a/Qw4uA/8r4aFE+g0aFK2ZSfgbDRbHYQwDQwrQwYjbv9F+QwHJ:ImQwmY8r4x4a/Qw4uA/Y4azg0aE2ZSfl

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Wshrat family

    • Async RAT payload

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v16

Tasks