General
-
Target
.
-
Size
2KB
-
Sample
240628-pknb8ayhjg
-
MD5
7cdc8f61fb1fc3883598588051cdbe0a
-
SHA1
92e76e7557196531dbdf862421178ecaf4e248e2
-
SHA256
6e6856c0003a452f331ac9f2c7d73c28ca0d1924763b43544dfa1a65cc92b68d
-
SHA512
0a74b11895cc550b98c0ae6b89afc1eb564920bc519ecbdc75a985d485f876f8ffa86afae021c1569c7767c6d4362a3e7acb4df3d373ffaf2bbe872c4d158309
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win11-20240508-en
Malware Config
Extracted
xworm
3.1
welxwrm.duckdns.org:8292
june9402xw.duckdns.org:9402
7jnhTfSNWZuGGfkd
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
xworm
5.0
rvxwrm5.duckdns.org:9390
7OXU3DwqjAAyqB4H
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
asyncrat
0.5.7B
Default
todfg.duckdns.org:6745
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
updateee.exe
-
install_folder
%AppData%
Extracted
asyncrat
Default
anachyyyyy.duckdns.org:7878
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
5.0.5
Venom Clients
ujhn.duckdns.org:8520
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
.
-
Size
2KB
-
MD5
7cdc8f61fb1fc3883598588051cdbe0a
-
SHA1
92e76e7557196531dbdf862421178ecaf4e248e2
-
SHA256
6e6856c0003a452f331ac9f2c7d73c28ca0d1924763b43544dfa1a65cc92b68d
-
SHA512
0a74b11895cc550b98c0ae6b89afc1eb564920bc519ecbdc75a985d485f876f8ffa86afae021c1569c7767c6d4362a3e7acb4df3d373ffaf2bbe872c4d158309
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Blocklisted process makes network request
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-