General
-
Target
D3STR0YCOMPUT3RS.bat
-
Size
26KB
-
Sample
231216-fdkhbaadgp
-
MD5
18aa3a29ea6572754fbf785a2eb03ed6
-
SHA1
69ee89c62e3fce0ae58e5803e283b511b41e8d81
-
SHA256
31890493973af1dbe3ecd33a59536cc24fa753ccb603372e17a05eafa5378746
-
SHA512
f2d1cf6512807e7868a48ea0c94eda7c6e75c8f5bad03e2a3313c39c83230b5116a78c803979ad051539c4dbcbf9aaf5c430f3d2259eca714d63e626ab4414a9
-
SSDEEP
384:89OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9Oh:3
Static task
static1
Behavioral task
behavioral1
Sample
D3STR0YCOMPUT3RS.bat
Resource
win11-20231215-en
Malware Config
Extracted
asyncrat
1.0.7
def
37.18.62.18:8060
era2312swe12-1213rsgdkms23
-
delay
1
-
install
true
-
install_file
CCXProcess.exe
-
install_folder
%Temp%
Extracted
toxiceye
https://api.telegram.org/bot5687152406:AAFin_LYFhJGLydMgYheeUDec-2orew51aM/sendMessage?chat_id=2024893777
https://api.telegram.org/bot5536756167:AAFMcQrFbMZMBynbrtZUudaOT9ndCJXIqT4/sendMessage?chat_id=2024893777
Extracted
xworm
3.1
-
Install_directory
%Port%
Targets
-
-
Target
D3STR0YCOMPUT3RS.bat
-
Size
26KB
-
MD5
18aa3a29ea6572754fbf785a2eb03ed6
-
SHA1
69ee89c62e3fce0ae58e5803e283b511b41e8d81
-
SHA256
31890493973af1dbe3ecd33a59536cc24fa753ccb603372e17a05eafa5378746
-
SHA512
f2d1cf6512807e7868a48ea0c94eda7c6e75c8f5bad03e2a3313c39c83230b5116a78c803979ad051539c4dbcbf9aaf5c430f3d2259eca714d63e626ab4414a9
-
SSDEEP
384:89OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9Oh:3
-
Detect Xworm Payload
-
Async RAT payload
-
Drops startup file
-
Executes dropped EXE
-
Queries the macOS version information.
-
file permission
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Unix Shell
1Scheduled Task/Job
1System Services
1Launchctl
1Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1