General
-
Target
fart.bat
-
Size
226KB
-
Sample
240709-wl45paxaqm
-
MD5
0c8d226f75ded4ec3abf53097b2c0218
-
SHA1
a9c050441912a60399a10a7e804107400823a90e
-
SHA256
23b5c706e75ea9f1fd451fb294b53e30d2bbd70f769914ad36568baf02c8bb87
-
SHA512
cc453bb8d5be86b5ff8abe349d6a706170408701c64d08a0b684d4df0afdc9274abde5164bc24e496e8fb8f16de42f0426c01469ecb263db9c2d46530cff3526
-
SSDEEP
6144:avNYZAmCjFQCRsVL6rgdc51/3b+IzLrp9Lvl60dAJ:asZChQD6RjnLrZxdu
Static task
static1
Malware Config
Extracted
xworm
unique-emotions.gl.at.ply.gg:54742
wiz.bounceme.net:6000
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
asyncrat
0.5.8
Default
card-buzz.gl.at.ply.gg:2497
uE6w2BW3TJU0
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
fart.bat
-
Size
226KB
-
MD5
0c8d226f75ded4ec3abf53097b2c0218
-
SHA1
a9c050441912a60399a10a7e804107400823a90e
-
SHA256
23b5c706e75ea9f1fd451fb294b53e30d2bbd70f769914ad36568baf02c8bb87
-
SHA512
cc453bb8d5be86b5ff8abe349d6a706170408701c64d08a0b684d4df0afdc9274abde5164bc24e496e8fb8f16de42f0426c01469ecb263db9c2d46530cff3526
-
SSDEEP
6144:avNYZAmCjFQCRsVL6rgdc51/3b+IzLrp9Lvl60dAJ:asZChQD6RjnLrZxdu
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Async RAT payload
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1