Overview
overview
10Static
static
3New Text Document.exe
windows10-1703-x64
10New Text Document.exe
windows7-x64
1New Text Document.exe
windows10-2004-x64
10New Text Document.exe
windows11-21h2-x64
10New Text Document.exe
android-10-x64
New Text Document.exe
android-11-x64
New Text Document.exe
android-13-x64
New Text Document.exe
android-9-x86
New Text Document.exe
macos-10.15-amd64
1New Text Document.exe
debian-12-armhf
New Text Document.exe
debian-12-mipsel
New Text Document.exe
debian-9-armhf
New Text Document.exe
debian-9-mips
New Text Document.exe
debian-9-mipsel
New Text Document.exe
ubuntu-18.04-amd64
New Text Document.exe
ubuntu-20.04-amd64
New Text Document.exe
ubuntu-22.04-amd64
New Text Document.exe
ubuntu-24.04-amd64
General
-
Target
New Text Document.bin
-
Size
4KB
-
Sample
240526-vxlxtaef89
-
MD5
a239a27c2169af388d4f5be6b52f272c
-
SHA1
0feb9a0cd8c25f01d071e9b2cfc2ae7bd430318c
-
SHA256
98e895f711226a32bfab152e224279d859799243845c46e550c2d32153c619fc
-
SHA512
f30e1ff506cc4d729f7e24aa46e832938a5e21497f1f82f1b300d47f45dae7f1caef032237ef1f5ae9001195c43c0103e3ab787f9196c8397846c1dea8f351da
-
SSDEEP
48:6r1huik0xzYGJZZJOQOulbfSqXSfbNtm:IIxcLpf6zNt
Static task
static1
Behavioral task
behavioral1
Sample
New Text Document.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
New Text Document.exe
Resource
win7-20240508-en
Behavioral task
behavioral3
Sample
New Text Document.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
New Text Document.exe
Resource
win11-20240426-en
Behavioral task
behavioral5
Sample
New Text Document.exe
Resource
android-x64-20240514-en
Behavioral task
behavioral6
Sample
New Text Document.exe
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral7
Sample
New Text Document.exe
Resource
android-33-x64-arm64-20240514-en
Behavioral task
behavioral8
Sample
New Text Document.exe
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral9
Sample
New Text Document.exe
Resource
macos-20240410-en
Behavioral task
behavioral10
Sample
New Text Document.exe
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral11
Sample
New Text Document.exe
Resource
debian12-mipsel-20240418-en
Behavioral task
behavioral12
Sample
New Text Document.exe
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral13
Sample
New Text Document.exe
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral14
Sample
New Text Document.exe
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral15
Sample
New Text Document.exe
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral16
Sample
New Text Document.exe
Resource
ubuntu2004-amd64-20240508-en
Behavioral task
behavioral17
Sample
New Text Document.exe
Resource
ubuntu2204-amd64-20240522.1-en
Behavioral task
behavioral18
Sample
New Text Document.exe
Resource
ubuntu2404-amd64-20240523-en
Malware Config
Extracted
https://d22hce23hy1ej9.cloudfront.net/load/th.php?a=2836&c=1002
Extracted
https://d22hce23hy1ej9.cloudfront.net/load/dl.php?id=444&c=1002
Extracted
Protocol: ftp- Host:
ftp.midhcodistribuciones.com - Port:
21 - Username:
[email protected] - Password:
,A7}+JV4KExQ
Extracted
asyncrat
| Edit 3LOSH RAT
Exodus_Market
leetboy.dynuddns.net:1339
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
svchos.exe
-
install_folder
%AppData%
Extracted
remcos
Remote
leetboy.dynuddns.net:1998
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
svcs.exe
-
copy_folder
microsofts
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
logsa
-
mouse_option
false
-
mutex
Rmc-3XK1S0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
asyncrat
| Edit 3LOSH RAT
LNKK
leetboy.dynuddns.net:1338
AsyncMutex_6h2caasdas2133sOkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
risepro
118.194.235.187:50500
Extracted
asyncrat
| Edit 3LOSH RAT
Load_Man
leetman.dynuddns.com:1337
AsyncMutex_6SI8asdasd2casOkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
redline
@OLEH_PSP
185.172.128.33:8970
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.midhcodistribuciones.com - Port:
21 - Username:
[email protected] - Password:
,A7}+JV4KExQ
Extracted
metasploit
metasploit_stager
129.159.151.146:3344
Extracted
xworm
5.0
45.141.27.41:7000
45.141.26.119:1996
85.203.4.146:7000
9ZF9ZsOZGh1T1r1n
-
Install_directory
%Public%
-
install_file
csrss.exe
Targets
-
-
Target
New Text Document.bin
-
Size
4KB
-
MD5
a239a27c2169af388d4f5be6b52f272c
-
SHA1
0feb9a0cd8c25f01d071e9b2cfc2ae7bd430318c
-
SHA256
98e895f711226a32bfab152e224279d859799243845c46e550c2d32153c619fc
-
SHA512
f30e1ff506cc4d729f7e24aa46e832938a5e21497f1f82f1b300d47f45dae7f1caef032237ef1f5ae9001195c43c0103e3ab787f9196c8397846c1dea8f351da
-
SSDEEP
48:6r1huik0xzYGJZZJOQOulbfSqXSfbNtm:IIxcLpf6zNt
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Xworm Payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service
-
Modifies security service
-
Phorphiex payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
XMRig Miner payload
-
Async RAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Modifies boot configuration data using bcdedit
-
Adds policy Run key to start application
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Contacts a large (648) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies Installed Components in the registry
-
Possible privilege escalation attempt
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Modifies system executable filetype association
-
Registers COM server for autorun
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
2Scheduled Task/Job
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
5Registry Run Keys / Startup Folder
5Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Change Default File Association
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
5Registry Run Keys / Startup Folder
5Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
3Disable or Modify Tools
2Modify Registry
12Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1