General

  • Target

    portmapper-2.2.3.exe

  • Size

    5.2MB

  • Sample

    240917-rhnajsxamc

  • MD5

    9f14a0573f96ce3c3374044e585f7eb0

  • SHA1

    88247dac3c2a4e5a760c215436a99afe9ad5577f

  • SHA256

    e5f62be708a0caa8b4e5dfcf07127eabc49a8a61a300f434367718b7e7c2e7e3

  • SHA512

    f1e5af30c5c251a294998eb15cef22d22c6e30c900e08d86721ad3bfe400b86b8866c8ec66082014f3f3da2fb576a4cf35f1ff9e1f36d1dad26403fa96f9f91b

  • SSDEEP

    98304:rqw3fQlyOEaEyr9QsYhzAkSuwnu0J74Ijb4eDaJo99AXvhdkfx5:rqw3fsVPYa7J7zjxae7iZdK

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:3232

l838.ddns.net:3232

0x365c3e6EeF15a2938FC7267D5A3386c8e23aBc5F:123

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Windows Security Wrapper.exe

Extracted

Family

asyncrat

Version

L838 RAT v1.0.0

Botnet

Default

C2

127.0.0.1:54984

l838.ddns.net:54984

Mutex

kswxiqghhjgkjqpqzz

Attributes
  • delay

    3

  • install

    true

  • install_file

    Windows Service Wrapper.exe

  • install_folder

    %programdata%

aes.plain

Targets

    • Target

      portmapper-2.2.3.exe

    • Size

      5.2MB

    • MD5

      9f14a0573f96ce3c3374044e585f7eb0

    • SHA1

      88247dac3c2a4e5a760c215436a99afe9ad5577f

    • SHA256

      e5f62be708a0caa8b4e5dfcf07127eabc49a8a61a300f434367718b7e7c2e7e3

    • SHA512

      f1e5af30c5c251a294998eb15cef22d22c6e30c900e08d86721ad3bfe400b86b8866c8ec66082014f3f3da2fb576a4cf35f1ff9e1f36d1dad26403fa96f9f91b

    • SSDEEP

      98304:rqw3fQlyOEaEyr9QsYhzAkSuwnu0J74Ijb4eDaJo99AXvhdkfx5:rqw3fsVPYa7J7zjxae7iZdK

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Detect Xworm Payload

    • NanoCore

      NanoCore is a remote access tool (RAT) with a variety of capabilities.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Async RAT payload

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks