General
-
Target
new.bat.zip
-
Size
10KB
-
Sample
240726-relbsasdkq
-
MD5
752c003ffc801c18235bdf38295c9ad2
-
SHA1
2e65e39e58f75f9a16717fac5b93986d22444265
-
SHA256
f47e714600091cce296bf13f12356fbe444ca298cd4f55e980c9a8bad5a38213
-
SHA512
5359c706282d40afd61f5d5537fc7e38c3c602f7078eb34ee81ce08f0ef1f20491fda1bf113f2b93f1f7e9466e1a78410cc5a95a57706af909e150f9d56c600f
-
SSDEEP
192:jLgga1u3fvgOfgO3pMzFLTSvl3N8AMwuy4qYAk9npw4t9fMjua9o7YAc7RhkT:nbaYPJKLE3N8vwKrRtt9fNJYAcVhI
Static task
static1
Behavioral task
behavioral1
Sample
new.bat
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
new.bat
Resource
win10v2004-20240709-en
Malware Config
Extracted
xworm
5.0
157.20.182.172:7000
157.20.182.172:8000
iHRgIbaS0FTMce5d
-
install_file
USB.exe
Extracted
asyncrat
Default
157.20.182.172:3232
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
nlthbmfyadihv
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/zNe6NH5y
Targets
-
-
Target
new.bat
-
Size
54KB
-
MD5
2f9e290249e705aa1ba5aacf057b22bb
-
SHA1
f60ff4ced8c331540a10285bb7ca74b91486a9f5
-
SHA256
56b8c6ac0a39cfe4cac12420f063371cf811116f70567641ff749d75fb9be912
-
SHA512
98b2abc5caffc080741051cd00220e1b6ffa920670be0994777626816708bc368b106787985408665e5dd3cf31a9f2219000a0d17ca4e5a6dc52b6861658322f
-
SSDEEP
768:06iORKR1BLWU1EWIOyNbZ9pSp2Mp7LC1QY3vMBnV9:eRiavmpSps1j3vMBnV9
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1