General
-
Target
New Text Document.zip
-
Size
1KB
-
Sample
231125-2t11wsdf6v
-
MD5
3c8b819becd177edcbab3aaa436f1038
-
SHA1
191e32ee0095c03ed38fb0cf656830eed585e53d
-
SHA256
f5091b65f748236c24c4f1d289cfafe78236dfea4768929a1f1fa91b2e5d0779
-
SHA512
a26c1b88243c14aad3e5d3cbddd63dcdd0ff00b0fa790db592ac89b3207220784cd77e861098448bc158816f8d352c139f7b1569441e4058170797ea3d0f0112
Static task
static1
Malware Config
Extracted
risepro
194.49.94.152
Extracted
xworm
3.1
needforrat.hopto.org:7000
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
njrat
0.7d
HacKed
needforrat.hopto.org:7772
47b887645f4457386c0b55e0a170685a
-
reg_key
47b887645f4457386c0b55e0a170685a
-
splitter
|'|'|
Extracted
formbook
4.1
tb8i
097jz.com
physium.net
sherwoodsubnet.com
scbaya.fun
us2048.top
danlclmn.com
starsyx.com
foxbox-digi.store
thefishermanhouse.com
salvanandcie.com
rykuruh.cfd
gelaoguan.net
petar-gojun.com
coandcompanyboutique.com
decentralizedcryptos.com
ecuajet.net
livbythebeach.com
cleaning-services-33235.bond
free-webbuilder.today
pussypower.net
tron-pk.xyz
heirvaeh.com
9129z18.com
0x0audits.top
gpoinad.com
texwwfrx.com
bonusurunler.online
babytoy-deals.com
8onlyfans.com
farmermapa.net
vallishealth.com
tiyu116.net
driftlessmenofthewoods.com
jaliyahsboutique.site
hillandvalley.wine
funlifeday.net
kmrcounselling.online
rolandofrias.online
6632k.vip
reporttask.online
99dd88.buzz
bradleymartinfitness.com
superflowers.pro
startaxeindhoven.com
districonsumohome.com
wombancircle.com
gdtanhua.icu
strikkzone.com
otismc.net
dataxmesh.com
assosolico.net
grataballi.com
geigenbau-duesseldorf.com
freightlizards.com
sololinkliving.com
hecticgame.com
stx.lat
cleanfood.bio
ismprojects.net
reillyleet.com
socialise.biz
collaco.info
genevalakeagent.com
drivefta.com
free-indeed.faith
Extracted
quasar
1.4.0
Office05
needforrat.hopto.org:7771
d70dba78-082d-4d62-9d71-b4a1c6961022
-
encryption_key
110272D9471BA005C613D451E07D98ABB8403AED
-
install_name
Client1.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Defender
-
subdirectory
SubDir
Extracted
netwire
needforrat.hopto.org:3360
needforrat.hopto.org:7777
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
qRhguWXi
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
Crack_Windows
-
use_mutex
true
Extracted
xworm
5.0
127.0.0.1:8888
93.123.85.68:8888
-
Install_directory
%ProgramData%
-
install_file
WinRar.exe
-
telegram
https://api.telegram.org/bot5831501082:AAELkQ6xM7p_N7x74e8Xrku-_ibYekoBMcY
Extracted
stealc
http://finnmanninger.icu
http://raphaelbischoff.icu
-
url_path
/40d570f44e84a454.php
Extracted
amadey
4.13
http://65.108.99.238
http://brodoyouevenlift.co.za
-
strings_key
bda044f544861e32e95f5d49b3939bcc
-
url_paths
/yXNwKVfkS28Y/index.php
/g5ddWs/index.php
/pOVxaw24d/index.php
Targets
-
-
Target
New Text Document.zip
-
Size
1KB
-
MD5
3c8b819becd177edcbab3aaa436f1038
-
SHA1
191e32ee0095c03ed38fb0cf656830eed585e53d
-
SHA256
f5091b65f748236c24c4f1d289cfafe78236dfea4768929a1f1fa91b2e5d0779
-
SHA512
a26c1b88243c14aad3e5d3cbddd63dcdd0ff00b0fa790db592ac89b3207220784cd77e861098448bc158816f8d352c139f7b1569441e4058170797ea3d0f0112
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Xworm Payload
-
NetWire RAT payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Quasar payload
-
Formbook payload
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Stops running service(s)
-
Drops startup file
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1