General
-
Target
new.bat
-
Size
10.0MB
-
Sample
240808-yjyw1asdld
-
MD5
c16890f92f82d9aa09e0863b9b972fd7
-
SHA1
58095238d31afefaa103a0ba7c9be0c5f76d4049
-
SHA256
8e8027584954b310a51dcedd2d905e557be41d1a14a2edb80f0026bd80d33048
-
SHA512
ccd09d87f7332b227c167c24679f253eb128062073549db799b24d7142b5e77e1669a403be552cda1f82fe608c1e5f9655f7d1b789b0913ff7aa8b203542f295
-
SSDEEP
96:t57sU5Mqwt3o3h2lvzNxmjNzFy5lKXX0lPuvRNUurK2Ltb5MAkZItmniAvTFI4Ns:7A4nQoBkdGpcnWw
Static task
static1
Behavioral task
behavioral1
Sample
new.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
new.bat
Resource
win7-20240705-en
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
momehvenom.duckdns.org:8520
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
xworm
3.1
momekxwrm.duckdns.org:8292
xwor3july.duckdns.org:9402
yh66xbyAobQEOS5f
-
install_file
USB.exe
Extracted
xworm
5.0
xwrmmone.duckdns.org:9390
jg6HwHbepPocwygj
-
install_file
USB.exe
Extracted
asyncrat
0.5.7B
Default
modsmasync.duckdns.org:6745
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
Default
nanarchym.duckdns.org:7878
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
new.bat
-
Size
10.0MB
-
MD5
c16890f92f82d9aa09e0863b9b972fd7
-
SHA1
58095238d31afefaa103a0ba7c9be0c5f76d4049
-
SHA256
8e8027584954b310a51dcedd2d905e557be41d1a14a2edb80f0026bd80d33048
-
SHA512
ccd09d87f7332b227c167c24679f253eb128062073549db799b24d7142b5e77e1669a403be552cda1f82fe608c1e5f9655f7d1b789b0913ff7aa8b203542f295
-
SSDEEP
96:t57sU5Mqwt3o3h2lvzNxmjNzFy5lKXX0lPuvRNUurK2Ltb5MAkZItmniAvTFI4Ns:7A4nQoBkdGpcnWw
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-