Resubmissions
01-05-2024 04:51
240501-fhbe7sgc8w 101-05-2024 04:43
240501-fch8vsga9z 1001-05-2024 04:43
240501-fcbh1sac65 401-05-2024 04:42
240501-fb44yaga8s 101-05-2024 04:42
240501-fbt9qsac53 401-05-2024 04:41
240501-fbf24sga6x 101-05-2024 04:40
240501-fahjjsga4s 401-05-2024 04:38
240501-e9jp8aga2s 401-05-2024 04:34
240501-e67ymsfh4y 10General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
def
C2
37.18.62.18:8060
Mutex
era2312swe12-1213rsgdkms23
Attributes
-
delay
1
-
install
true
-
install_file
CCXProcess.exe
-
install_folder
%Temp%
aes.plain
Extracted
Family
toxiceye
C2
https://api.telegram.org/bot5687152406:AAFin_LYFhJGLydMgYheeUDec-2orew51aM/sendMessage?chat_id=2024893777
Targets
-
-
Target
https://github.com/errias/XWorm-Rat-Remote-Administration-Tool-
-
Async RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Legitimate hosting services abused for malware hosting/C2
-