General
-
Target
corn.bat
-
Size
25KB
-
Sample
240925-mg9d6szgjm
-
MD5
2c82d131bec739831e83aee1b7e39ea3
-
SHA1
a34c4733bc21f390751f8271f0a300112f523b90
-
SHA256
794e2e7342934bdd01396b10677eec9ec01fc9031b35be49e4e2f5a9ceee9adb
-
SHA512
07b2b03cb58cdff99a9890d6f4d28c9d24cf625c5bd3075934b63edb914db89bae02f868deafd50d8053da153e911689c1caebb8efc35e83c014308d2ee17166
-
SSDEEP
768:gTYcpQyuPmhDGEhtKCd6BgL/3uq5soVWn20PRv97mrPfl:gTYcpQyuPmhDGEhtKCdlL/HhVKl1Sr3l
Static task
static1
Behavioral task
behavioral1
Sample
corn.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
corn.bat
Resource
win10v2004-20240802-en
Malware Config
Extracted
asyncrat
Default
101.99.92.203:3232
91.92.247.210:3232
45.66.231.150:3232
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
xworm
5.0
101.99.92.203:8000
Xyva8ZHyTHQcBno1
-
install_file
USB.exe
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
91.92.247.210:4449
sarcofamdkdtq
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
corn.bat
-
Size
25KB
-
MD5
2c82d131bec739831e83aee1b7e39ea3
-
SHA1
a34c4733bc21f390751f8271f0a300112f523b90
-
SHA256
794e2e7342934bdd01396b10677eec9ec01fc9031b35be49e4e2f5a9ceee9adb
-
SHA512
07b2b03cb58cdff99a9890d6f4d28c9d24cf625c5bd3075934b63edb914db89bae02f868deafd50d8053da153e911689c1caebb8efc35e83c014308d2ee17166
-
SSDEEP
768:gTYcpQyuPmhDGEhtKCd6BgL/3uq5soVWn20PRv97mrPfl:gTYcpQyuPmhDGEhtKCdlL/HhVKl1Sr3l
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-