General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
Family
asyncrat
Version
| Edit 3LOSH RAT
Botnet
rat1
C2
xfreddy2751.duckdns.org:6606
xfreddy2751.duckdns.org:7707
xfreddy2751.duckdns.org:8808
darkstorm275991.ddns.net:6606
darkstorm275991.ddns.net:7707
darkstorm275991.ddns.net:8808
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
true
-
install_file
License.exe
-
install_folder
%AppData%
aes.plain
Extracted
Family
xworm
Version
5.0
Mutex
xzhtnAosMU4zvKel
Attributes
-
Install_directory
%AppData%
-
install_file
freehacks.exe
-
pastebin_url
https://pastebin.com/raw/H3wFXmEi
aes.plain
Targets
-
-
Target
https://github.com/Wizard641/XWorm-V5.2-Cracked/releases
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Xworm Payload
-
AgentTesla payload
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Uses the VBS compiler for execution
-