General
-
Target
GTA ONLINE QUEST.txt
-
Size
5KB
-
Sample
240812-v288xawbke
-
MD5
cefbb39e28c2736956e5ff560b7592b4
-
SHA1
b6af6a91f118cbaff728a213ee205bff78995f55
-
SHA256
5abb51a13fe99203cb082d897f2a48e1d30766c28ba1180977a9807b55ccc22d
-
SHA512
c6c9585b4c0d609767f66b9b80643f5ea688ddf4ea59f9f420db4340aa179719e3ca6cb0f325e33253c1346842fb6a3b0252f1e0a6fd61b6b76d514bd7431545
-
SSDEEP
96:+b3IXPOqRfbk9bbdiZSxUcUk9+GdiofOxN+75p4j7NvLwNiUlxAlT6l:+b4tEbbfxUcUk9bUofOW5p49vLKxiU
Static task
static1
Behavioral task
behavioral1
Sample
GTA ONLINE QUEST.js
Resource
win10v2004-20240802-en
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot5687152406:AAFin_LYFhJGLydMgYheeUDec-2orew51aM/sendMessage?chat_id=2024893777
Extracted
xworm
127.0.0.1:7000
6LgoART3hAaWLFr2
-
install_file
USB.exe
Extracted
gurcu
https://api.telegram.org/bot5687152406:AAFin_LYFhJGLydMgYheeUDec-2orew51aM/sendMessage?chat_id=2024893777
Targets
-
-
Target
GTA ONLINE QUEST.txt
-
Size
5KB
-
MD5
cefbb39e28c2736956e5ff560b7592b4
-
SHA1
b6af6a91f118cbaff728a213ee205bff78995f55
-
SHA256
5abb51a13fe99203cb082d897f2a48e1d30766c28ba1180977a9807b55ccc22d
-
SHA512
c6c9585b4c0d609767f66b9b80643f5ea688ddf4ea59f9f420db4340aa179719e3ca6cb0f325e33253c1346842fb6a3b0252f1e0a6fd61b6b76d514bd7431545
-
SSDEEP
96:+b3IXPOqRfbk9bbdiZSxUcUk9+GdiofOxN+75p4j7NvLwNiUlxAlT6l:+b4tEbbfxUcUk9bUofOW5p49vLKxiU
-
Detect Xworm Payload
-
Detect rhadamanthys stealer shellcode
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Scheduled Task/Job
1Scheduled Task
1Scripting
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1