The “-ASYNCRAT-Command & Control ” overview associated with the IP address 51.81.30.54:666 is a malicious remote access trojan (RAT) hackers use to gain unauthorized access to victims’ computers. This specific RAT is known to be part of the Zeus botnet, a large network of infected computers controlled by cybercriminals.

The “-ASYNCRAT-Command & Control” component of the Zeus botnet allows hackers to control infected computers remotely. Hackers can use this component to install malware, steal data, and launch attacks.

MonthDate UpdatedCNC AttributionIP AddressASNCityGeographic Country LocationCloud Instance
Sep-202423 September 2024ASYNCRAT-Command & Control51.81.30.54:66616276AshburnUnited States (US)OVH, FR
threatactix-index
1. Analysishttp://51.81.30.54:666/

https://www.virustotal.com/gui/url/6991779bac78389e6966d4e49f9df27d733d0db613233851db7dba00ad69f374?nocache=1

Analysis- Threatactix
2. Analysis of a payload URLhttp://51.81.30.54:666/wsh.jpg

https://www.virustotal.com/gui/url/b0187c9bf86a7abd5d8c1d7942f454c9cdd06190132d7bd6e330e19423b8beb2?nocache=1

Analysis 2- Threatactix
Malicious Payload Execution Commands
execution command-Threatactix

Execution cycle pattern for the provided RAT (Remote Access Trojan) code snippet:

  1. Initial Sleep: The script starts with WScript.Sleep 3000, which pauses execution for 3 seconds. This could be a tactic to evade basic detection methods.
  2. Download Script:
    • The DownloadAndExtract function is defined.
    • It creates two command strings:
      1. DownloadCmd: This uses powershell.exe to initiate a download using Start-BitsTransfer. It fetches a file from the specified URL and saves it to the zip path.
    • The script is called Shell. Run to execute the DownloadCmd in a hidden window (0 flag) and wait for completion (True flag).
  3. Extract Payload:
    • A new command string ExtractCmd is created.
    • It uses powershell.exe again with Expand-Archive to unpack the downloaded file (presumably a ZIP archive) from the zipPath to the extractPath.
    • Similar to download, Shell. Run executes ExtractCmd in a hidden window and waits for completion.
  4. Run Payload:
    • The script defines the filePath variable, pointing to a location likely containing the extracted malicious script (Auto.vbs).
    • An empty parameter variable is defined (potentially for future use).
    • Finally, Shell. A run is called again. This time, it executes the contents of the filePath with potentially empty arguments.
YARA Rules for the RAT Execution Cycle

Understanding the Execution Cycle:

Based on the provided code, we can identify key patterns that can be used to create YARA rules:

  1. PowerShell Commands: The script uses PowerShell to download and extract files.
  2. File Paths: Specific file paths (like C:\Users\Public\Auto.vbs) are used.
  3. String Patterns: The script contains strings like “Start-BitsTransfer”, “Expand-Archive”, and “WScript.Shell”.
YARA Rules:

Here are some potential YARA rules based on these patterns:

Rule 1: PowerShell Commands and File Paths

rule RAT_Execution_1

{

    strings:

        $a1 = “Start-BitsTransfer”

        $a2 = “Expand-Archive”

        $a3 = “C:\\Users\\Public\\Auto.vbs”

    condition:

        $a1 and $a2 and $a3

}

Rule 2: String Patterns and File Paths

rule RAT_Execution_2

{

    strings:

        $a1 = “WScript.Shell”

        $a2 = “C:\\Users\\Public\\Auto.vbs”

    condition:

        $a1 and $a2

}

Rule 3: PowerShell Commands and String Patterns

rule RAT_Execution_3

{

    strings:

        $a1 = “Start-BitsTransfer”

        $a2 = “Expand-Archive”

        $a3 = “WScript.Shell”

    condition:

        $a1 and $a2 and $a3

}