General
-
Target
asdasdsa.txt
-
Size
43B
-
Sample
240717-rmr5asvalq
-
MD5
4ebb1532e7a39ebff63f7ec2b66ddc42
-
SHA1
765d8f007d393b862cea122a7b9de3bda78c6611
-
SHA256
846ccd88c8f4d661c315d6845df3d6d98a9f39304859896b9f962f384fe9bc42
-
SHA512
1651abb23f7b74833cdd61f0c7189e92afba45dd55909e7e54a3b8fa8dfe2fc6b8a30c86c09637b516a959795e9a4ae72be868f47b1f4eb2046ed7e32db9aaf5
Static task
static1
Malware Config
Extracted
asyncrat
Mass
-
delay
1
-
install
true
-
install_file
resmon.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/vVV7NnRY
Extracted
xworm
-
Install_directory
%ProgramData%
-
pastebin_url
https://pastebin.com/raw/eMZHAtyt
-
telegram
https://api.telegram.org/bot6338141396:AAGg4qZTehKfJS9RpnQx6czOOZ5VbB2yFcE/sendMessage?chat_id=1842323841
Extracted
gurcu
https://api.telegram.org/bot6338141396:AAGg4qZTehKfJS9RpnQx6czOOZ5VbB2yFcE/sendMessage?chat_id=1842323841
Targets
-
-
Target
asdasdsa.txt
-
Size
43B
-
MD5
4ebb1532e7a39ebff63f7ec2b66ddc42
-
SHA1
765d8f007d393b862cea122a7b9de3bda78c6611
-
SHA256
846ccd88c8f4d661c315d6845df3d6d98a9f39304859896b9f962f384fe9bc42
-
SHA512
1651abb23f7b74833cdd61f0c7189e92afba45dd55909e7e54a3b8fa8dfe2fc6b8a30c86c09637b516a959795e9a4ae72be868f47b1f4eb2046ed7e32db9aaf5
-
Detect Xworm Payload
-
Async RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1