General
-
Target
56d98688e5aa501787a31e98f9666b80002bb692e793257bb3a6f6f9cace8278.exe
-
Size
95KB
-
Sample
240808-bmz7xa1ejf
-
MD5
bed020cbba2610b31af66357db97c10c
-
SHA1
d4c68500e5f8125b60976af885172253a435cc78
-
SHA256
56d98688e5aa501787a31e98f9666b80002bb692e793257bb3a6f6f9cace8278
-
SHA512
08fb0c1fa421dbdd61aa57d2adc7127cf7def12e88db054515be18ec05207e6f93ad775316137267d77e987e0145439e293af4784eb9b17826d9cb39fdedd931
-
SSDEEP
1536:6GCx35SC0o7Yrcpv41Efir+XKEkRi/gN2ieJOW56+Cj5sVMH:6GO35SBrcpgSfPLkEybeJL56+CtYMH
Static task
static1
Behavioral task
behavioral1
Sample
56d98688e5aa501787a31e98f9666b80002bb692e793257bb3a6f6f9cace8278.exe
Resource
win7-20240729-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
103.174.191.71:6606
103.174.191.71:7707
103.174.191.71:8808
HFE2t0VQV50q
-
delay
3
-
install
false
-
install_file
game.exe
-
install_folder
%AppData%
Extracted
xworm
5.0
testarosa.duckdns.org:7110
H1C6pa3caMCcJ1BG
-
Install_directory
%LocalAppData%
-
install_file
svchost.exe
Targets
-
-
Target
56d98688e5aa501787a31e98f9666b80002bb692e793257bb3a6f6f9cace8278.exe
-
Size
95KB
-
MD5
bed020cbba2610b31af66357db97c10c
-
SHA1
d4c68500e5f8125b60976af885172253a435cc78
-
SHA256
56d98688e5aa501787a31e98f9666b80002bb692e793257bb3a6f6f9cace8278
-
SHA512
08fb0c1fa421dbdd61aa57d2adc7127cf7def12e88db054515be18ec05207e6f93ad775316137267d77e987e0145439e293af4784eb9b17826d9cb39fdedd931
-
SSDEEP
1536:6GCx35SC0o7Yrcpv41Efir+XKEkRi/gN2ieJOW56+Cj5sVMH:6GO35SBrcpgSfPLkEybeJL56+CtYMH
-
Detect Xworm Payload
-
Async RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-