General

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

T

C2

20.199.8.16:1726

Mutex

31FGTEWnaxDE

Attributes
  • delay

    3

  • install

    false

  • install_file

    SeacrhIndexer

  • install_folder

    %AppData%

aes.plain
1
razw6Q1sHYZYJD6JGXOPsR8gsPnmaZN1

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Y

C2

20.199.8.16:1726

Mutex

eYLuHMmPZK7A

Attributes
  • delay

    3

  • install

    false

  • install_file

    SeacrhIndexer

  • install_folder

    %AppData%

aes.plain
1
o1KHHvVFhu0agXEqTE9tui8JhIsXxTJg

Extracted

Family

xworm

Version

5.0

aes.plain
1
5OGRST5eP1eL0HS7IwELTQ==

Extracted

Family

xworm

C2

auto-london.gl.at.ply.gg:51655

wiz.bounceme.net:6000

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    NigNigRat.exe

aes.plain
1
LyyVlmB4gN+wRDlAw0eqeg==

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7135635206:AAGyO5ndYz5tM5LiN-svz-5L8kLQuZwOEqM/sendPhot

Targets

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Detect Xworm Payload

    • Gurcu, WhiteSnake

      Gurcu is a malware stealer written in C#.

    • UAC bypass

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Async RAT payload

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.