General
-
Target
sample.zip
-
Size
42.8MB
-
Sample
240926-q9tqza1amn
-
MD5
7579c349d3f04d81d16020218b4b014e
-
SHA1
7299091625d2af8508e6c3e07e236ee47ac4400a
-
SHA256
0366ac31796c460c24e7d71469e86f4c7e9509f3b52f4c24921d19d7b5786f16
-
SHA512
6e7a4f071e8c74686d18892768e8158d00fba5bebad9bd0947374b08b79b7b0fa87f756618ad80ba5728db71db42a556fad990066f9d87232c0c2e35d00e3e94
-
SSDEEP
786432:oDXXuerfHkIZf06hLwbl9Pm2TW38ZF+oxwk4fbSep82zpMN8:oDnXfHkIZcXM2TdZooxwnXWN8
Static task
static1
Behavioral task
behavioral1
Sample
sample.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
sample.zip
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
sample.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
sample.zip
Resource
win11-20240802-en
Malware Config
Extracted
asyncrat
Default
101.99.92.203:3232
91.92.247.210:3232
45.66.231.150:3232
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
xworm
5.0
101.99.92.203:8000
Xyva8ZHyTHQcBno1
-
install_file
USB.exe
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
91.92.247.210:4449
sarcofamdkdtq
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
sample.zip
-
Size
42.8MB
-
MD5
7579c349d3f04d81d16020218b4b014e
-
SHA1
7299091625d2af8508e6c3e07e236ee47ac4400a
-
SHA256
0366ac31796c460c24e7d71469e86f4c7e9509f3b52f4c24921d19d7b5786f16
-
SHA512
6e7a4f071e8c74686d18892768e8158d00fba5bebad9bd0947374b08b79b7b0fa87f756618ad80ba5728db71db42a556fad990066f9d87232c0c2e35d00e3e94
-
SSDEEP
786432:oDXXuerfHkIZf06hLwbl9Pm2TW38ZF+oxwk4fbSep82zpMN8:oDnXfHkIZcXM2TdZooxwnXWN8
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-