General
-
Target
bomb.bin
-
Size
12KB
-
Sample
240128-xvp8kahgdl
-
MD5
2a44757cb52768ac7b35a42c41d3835f
-
SHA1
7eeeb57f1f583b7f3c1dad4b19a2da0854160f30
-
SHA256
97efe91fe5eff3dcdcb055f037f1df01c1409e6bd38a8f07170ea53a0ff265ef
-
SHA512
6a3cd321f1977d2a930b9e22074686497bc5dab9be45289c2130dcf36ab19e05f10988a345b9df7988593c80ee2f2304e141d778a1b91a29eaf75fea3b89de0a
-
SSDEEP
192:WHqdmIazGejA7HhdSbwPz1ULU87glpK/b26J4L1Xej5:WKdGxjALhMSULU870gJ/
Static task
static1
Behavioral task
behavioral1
Sample
bomb.exe
Resource
win7-20231215-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
82.115.223.244:4449
fnpxcekdvtg
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
risepro
193.233.132.62:50500
Extracted
xworm
163.5.215.245:9049
r3SLo8kx59hai6gX
Targets
-
-
Target
bomb.bin
-
Size
12KB
-
MD5
2a44757cb52768ac7b35a42c41d3835f
-
SHA1
7eeeb57f1f583b7f3c1dad4b19a2da0854160f30
-
SHA256
97efe91fe5eff3dcdcb055f037f1df01c1409e6bd38a8f07170ea53a0ff265ef
-
SHA512
6a3cd321f1977d2a930b9e22074686497bc5dab9be45289c2130dcf36ab19e05f10988a345b9df7988593c80ee2f2304e141d778a1b91a29eaf75fea3b89de0a
-
SSDEEP
192:WHqdmIazGejA7HhdSbwPz1ULU87glpK/b26J4L1Xej5:WKdGxjALhMSULU870gJ/
-
Detect Xworm Payload
-
Detect ZGRat V1
-
Glupteba payload
-
Async RAT payload
-
XMRig Miner payload
-
Creates new service(s)
-
Downloads MZ/PE file
-
Stops running service(s)
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-