General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
discordrat
-
discord_token
MTIyNjExNzA4MjI5OTYyOTU4OQ.GrM5Bi.Q6AkAXToCVgUFSQddwESQ9i03Hb8hChYfP_Mvo
-
server_id
1225929862271860808
Extracted
C:\Users\Admin\Desktop\fortnite-hack-and-esp-free-2024-not-detected-main\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Extracted
xworm
5.0
127.0.0.1:7000
LK1tcQzVjdOfCJrx
-
Install_directory
%AppData%
-
install_file
sv_gost120938.exe
Extracted
quasar
1.4.1
Office04
nvidia.zapto.org:1800
81c389fb-31fe-4833-ba91-b648eb594019
-
encryption_key
2FB04E694FBA442FB0237233F61FC3479E3721CB
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
nvidia
-
subdirectory
SubDir
Targets
-
-
Target
https://github.com
-
Detect Xworm Payload
-
Detect ZGRat V1
-
Quasar payload
-
Downloads MZ/PE file
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Indicator Removal
1File Deletion
1Modify Registry
3