General

  • Target

    4363463463464363463463463.exe

  • Size

    10KB

  • Sample

    240130-avwc9adha5

  • MD5

    2a94f3960c58c6e70826495f76d00b85

  • SHA1

    e2a1a5641295f5ebf01a37ac1c170ac0814bb71a

  • SHA256

    2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce

  • SHA512

    fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f

  • SSDEEP

    192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_http

C2

http://193.117.208.148:7800/-55P7pqBpQdijWOMB9Nd5w7x4wsLqUJqZS-N33VLPVJhDR2Aa4VA

Extracted

Family

gcleaner

C2

185.172.128.90

5.42.64.3

5.42.65.85

45.139.105.171

85.31.46.167

107.182.129.235

171.22.30.106

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6702604510:AAHhqcLx9PnHKK0GHfjoUU1QRG5B5kHI1FI/

Extracted

Family

smokeloader

Botnet

pub2

Extracted

Family

stealc

C2

http://185.172.128.79

Attributes
  • url_path

    /3886d2276f6914c4.php

rc4.plain

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

127.0.0.1:1604

185.169.180.209:1604

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

darkcomet

Botnet

Guest16

C2

gameservice.ddns.net:4320

Mutex

DC_MUTEX-WBUNVXD

Attributes
  • InstallPath

    AudioDriver\taskhost.exe

  • gencode

    EWSsWwgyJrUD

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    AudioDriver

Extracted

Family

xworm

C2

209.145.51.44:7000

Mutex

iLWUbOJf8Atlquud

Attributes
  • install_file

    USB.exe

aes.plain

Targets

MITRE ATT&CK Enterprise v15

Tasks