Analysis
-
max time kernel
1799s -
max time network
1801s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 15:43
General
-
Target
my_first_rat.exe
-
Size
33KB
-
MD5
3187225b20db4341a6688968ced00835
-
SHA1
1ef5354c93a49c1fc67ca40815d9c69436b92656
-
SHA256
661228edf93044850a5011990c8e2db5cba8ac56dd384e2a00d9147a6827c6e4
-
SHA512
20fe9a75f9ee30e231c33e528e23aa3fc217ef3ba40c1ae7ab15e67f25de885c61185ada3371a2120bcc9ff69f7be195cb1d0963dbf7b14ffd306e9e055f41b1
-
SSDEEP
384:xfP/SG1aTTcPTEUV75LC2TM42pfL3iB7OxVqWmRApkFXBLTsOZwpGN2v99IkuisJ:x11weF3Y42JiB70cVF49jR1Ojhubm
Malware Config
Extracted
Family
xworm
Version
5.0
C2
127.0.0.1:17816
8.tcp.us-cal-1.ngrok.io:17816
Mutex
ECnuEVmhYYYEOUIY
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/5096-0-0x0000000000F50000-0x0000000000F5E000-memory.dmp family_xworm -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 25 IoCs
flow ioc 93 8.tcp.us-cal-1.ngrok.io 212 8.tcp.us-cal-1.ngrok.io 264 8.tcp.us-cal-1.ngrok.io 77 8.tcp.us-cal-1.ngrok.io 256 8.tcp.us-cal-1.ngrok.io 52 8.tcp.us-cal-1.ngrok.io 139 8.tcp.us-cal-1.ngrok.io 163 8.tcp.us-cal-1.ngrok.io 151 8.tcp.us-cal-1.ngrok.io 220 8.tcp.us-cal-1.ngrok.io 228 8.tcp.us-cal-1.ngrok.io 66 8.tcp.us-cal-1.ngrok.io 85 8.tcp.us-cal-1.ngrok.io 188 8.tcp.us-cal-1.ngrok.io 28 8.tcp.us-cal-1.ngrok.io 101 8.tcp.us-cal-1.ngrok.io 171 8.tcp.us-cal-1.ngrok.io 204 8.tcp.us-cal-1.ngrok.io 180 8.tcp.us-cal-1.ngrok.io 196 8.tcp.us-cal-1.ngrok.io 238 8.tcp.us-cal-1.ngrok.io 246 8.tcp.us-cal-1.ngrok.io 112 8.tcp.us-cal-1.ngrok.io 120 8.tcp.us-cal-1.ngrok.io 130 8.tcp.us-cal-1.ngrok.io -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5096 my_first_rat.exe