Resubmissions

23-04-2023 09:56

230423-lycwvscf66 10

23-04-2023 09:54

230423-lxf7wsec61 10

General

  • Target

    Venom HVNC 5.4.0 crack.rar

  • Size

    14.5MB

  • Sample

    230423-lycwvscf66

  • MD5

    3276eefc2547702c8a7fbc6db1275c36

  • SHA1

    6c7ae5b03b8da23e5335da100675fc3ea824bbe4

  • SHA256

    458c83f0bc425cb9fecfe4b60bd5e2df08fadffea5598422ff0561dee46b6e9a

  • SHA512

    15a04bbf3990e78344ae7d657f1a35e90fbe856011aeee696dd4c206c551a834c5493c864f274525b4ac65ee383f3a0887cb4d3583962d9c2e1a51706b30771f

  • SSDEEP

    393216:aLWJa3c4xuHK2CbbjlACVnyGinovZept7T4:Nc3oK2ebOynyG5vwr4

Malware Config

Extracted

Family

xworm

C2

behind-him.at.ply.gg:27180

Attributes
  • install_file

    USB.exe

Extracted

Family

quasar

Attributes
  • reconnect_delay

    5000

Targets

    • Target

      Venom HVNC 5.4.0 crack.rar

    • Size

      14.5MB

    • MD5

      3276eefc2547702c8a7fbc6db1275c36

    • SHA1

      6c7ae5b03b8da23e5335da100675fc3ea824bbe4

    • SHA256

      458c83f0bc425cb9fecfe4b60bd5e2df08fadffea5598422ff0561dee46b6e9a

    • SHA512

      15a04bbf3990e78344ae7d657f1a35e90fbe856011aeee696dd4c206c551a834c5493c864f274525b4ac65ee383f3a0887cb4d3583962d9c2e1a51706b30771f

    • SSDEEP

      393216:aLWJa3c4xuHK2CbbjlACVnyGinovZept7T4:Nc3oK2ebOynyG5vwr4

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Lateral Movement

Replication Through Removable Media

1
T1091

Command and Control

Web Service

1
T1102

Tasks