General

  • Target

    https://github.com/Wizard641/XWorm-V5.2-Cracked/releases

  • Sample

    240331-n5y4saba4y

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

rat1

C2

xfreddy2751.duckdns.org:6606

xfreddy2751.duckdns.org:7707

xfreddy2751.duckdns.org:8808

darkstorm275991.ddns.net:6606

darkstorm275991.ddns.net:7707

darkstorm275991.ddns.net:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    License.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

xworm

Version

5.0

Mutex

xzhtnAosMU4zvKel

Attributes
  • Install_directory

    %AppData%

  • install_file

    freehacks.exe

  • pastebin_url

    https://pastebin.com/raw/H3wFXmEi

aes.plain

Targets

    • Target

      https://github.com/Wizard641/XWorm-V5.2-Cracked/releases

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • AgentTesla payload

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

MITRE ATT&CK Enterprise v15

Tasks