General
-
Target
ed96deb2efe2997cc93edd758ef59a00N
-
Size
411KB
-
Sample
240911-qrrtnasgnl
-
MD5
ed96deb2efe2997cc93edd758ef59a00
-
SHA1
29f5e5f308841e1195ac771af9cbd3257ed65062
-
SHA256
150e3d4357346ca552b55feb1cc2a1a3bccf900a843755bb24eb2e312182bca9
-
SHA512
73b66ca0e6c5a7bb8be02a9968cfd9f6d07e97e2ce8dafc0d1a8a91828acaed5328a11dd5d24678735255139d6711b0d069a43f20b34bfbd2f7f197401aeb168
-
SSDEEP
6144:93uBhcMltKAu2znCXPHfTEAy8gjTs5DWgxsryq:QBy8KYCfHfTEAy/MWgxIy
Static task
static1
Behavioral task
behavioral1
Sample
ed96deb2efe2997cc93edd758ef59a00N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed96deb2efe2997cc93edd758ef59a00N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7308504158:AAGvjg5ZWkkItSzfmQZs_qu73xKZ_gWVkJI/sendMessage?chat_id=6291749148
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
xworm
5.0
185.252.232.158:7812
b0c5WZixE6SqaTDD
-
Install_directory
%AppData%
-
install_file
Windows Defender Security Service.exe
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
185.252.232.158:7812
64.23.232.116:7812
vsvf
-
delay
1
-
install
true
-
install_file
Windows Security Health Service.exe
-
install_folder
%AppData%
Targets
-
-
Target
ed96deb2efe2997cc93edd758ef59a00N
-
Size
411KB
-
MD5
ed96deb2efe2997cc93edd758ef59a00
-
SHA1
29f5e5f308841e1195ac771af9cbd3257ed65062
-
SHA256
150e3d4357346ca552b55feb1cc2a1a3bccf900a843755bb24eb2e312182bca9
-
SHA512
73b66ca0e6c5a7bb8be02a9968cfd9f6d07e97e2ce8dafc0d1a8a91828acaed5328a11dd5d24678735255139d6711b0d069a43f20b34bfbd2f7f197401aeb168
-
SSDEEP
6144:93uBhcMltKAu2znCXPHfTEAy8gjTs5DWgxsryq:QBy8KYCfHfTEAy/MWgxIy
-
Detect Xworm Payload
-
StormKitty payload
-
Async RAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1