General
-
Target
Xenos64.exe
-
Size
822KB
-
Sample
230411-l6fmqadd9t
-
MD5
c534acff6f393a7e0080adc2497b4dac
-
SHA1
880c5bab820a36a8cf799d8bfffbd99b12c50fd3
-
SHA256
a9c2bcc9730134d4c37d077b598cd1542c23c82e462bed69fd8786a11018dc30
-
SHA512
178eaa6d06a18e29da4ad0f69fbe8eee57643e1729d5f55c0151283d203abc58e736d8cc574604f792f38df4758a57aaf1b81ac29f2478c8efc3ed29256dff6d
-
SSDEEP
24576:lgZXoZUTVdt7K1Si1Gwpr83MdAl+DjbJyod:QeSq1r88d6Uz
Static task
static1
Malware Config
Extracted
https://pastebin.com/raw/TsGkGCyE
Extracted
asyncrat
1.0.7
Default
Mutex
-
delay
10
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/eSp7rncc
Targets
-
-
Target
Xenos64.exe
-
Size
822KB
-
MD5
c534acff6f393a7e0080adc2497b4dac
-
SHA1
880c5bab820a36a8cf799d8bfffbd99b12c50fd3
-
SHA256
a9c2bcc9730134d4c37d077b598cd1542c23c82e462bed69fd8786a11018dc30
-
SHA512
178eaa6d06a18e29da4ad0f69fbe8eee57643e1729d5f55c0151283d203abc58e736d8cc574604f792f38df4758a57aaf1b81ac29f2478c8efc3ed29256dff6d
-
SSDEEP
24576:lgZXoZUTVdt7K1Si1Gwpr83MdAl+DjbJyod:QeSq1r88d6Uz
-
Async RAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-