Play interactive tourEdit tour
Analysis Report Invoice-ID-(882451).vbs
Overview
General Information
Detection
AsyncRAT
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found malware configuration
Sigma detected: Drops script at startup location
VBScript performs obfuscated calls to suspicious functions
Yara detected AsyncRAT
Yara detected obfuscated html page
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Sigma detected: MSHTA Spawning Windows Shell
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Stores files to the Windows start menu directory
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match
Classification
Startup |
---|
|
Malware Configuration |
---|
Threatname: AsyncRAT |
---|
{"Server": "clayroot2016.linkpc.net", "Ports": "6666", "Version": "0.5.7B", "Autorun": "false", "Install_Folder": "%AppData%", "Install_File": "", "AES_key": "e4Fpuk1cJ5OkC7E8UIORFI08LAwSyWpN", "Mutex": "AsyncMutex_6SI8OkPnk", "AntiDetection": "false", "External_config_on_Pastebin": "null", "BDOS": "false", "Startup_Delay": "3", "HWID": "null", "Certificate": "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", "ServerSignature": "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", "Group": "Default"}
Yara Overview |
---|
PCAP (Network Traffic) |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_PS1_FromBase64String_Content_Indicator | Detects suspicious base64 encoded PowerShell expressions | Florian Roth |
|
Dropped Files |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Obshtml | Yara detected obfuscated html page | Joe Security | ||
SUSP_PS1_FromBase64String_Content_Indicator | Detects suspicious base64 encoded PowerShell expressions | Florian Roth |
|
Memory Dumps |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_PS1_FromBase64String_Content_Indicator | Detects suspicious base64 encoded PowerShell expressions | Florian Roth |
| |
SUSP_PS1_FromBase64String_Content_Indicator | Detects suspicious base64 encoded PowerShell expressions | Florian Roth |
| |
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
SUSP_PS1_FromBase64String_Content_Indicator | Detects suspicious base64 encoded PowerShell expressions | Florian Roth |
| |
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Click to see the 7 entries |
Unpacked PEs |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Click to see the 3 entries |
Sigma Overview |
---|
System Summary: |
---|
Sigma detected: Drops script at startup location | Show sources |
Source: | Author: Joe Security: |
Sigma detected: MSHTA Spawning Windows Shell | Show sources |
Source: | Author: Michael Haag: |
Signature Overview |
---|
Click to jump to signature section
Show All Signature Results
AV Detection: |
---|
Found malware configuration | Show sources |
Source: | Malware Configuration Extractor: |