General

  • Target

    cheat_loader_v2.02___.bat

  • Size

    3KB

  • Sample

    240929-31dpls1cph

  • MD5

    eea245644e31da14d04d9cd773894249

  • SHA1

    838d855c89b7b9d4b84a8ff571b775dbf52a3fcb

  • SHA256

    fa37fb4035d2e946783605f105ddbc60accbe85035b99cd50c1add665c017c37

  • SHA512

    c86741059d06f349c4dcf089db5483d4bdaa10bdf728f3673e82167ff81a7495585d56b48faab6383f1d79aa02b202919a3a9c920f432f3b7f18595b679fb661

Malware Config

Extracted

Family

xworm

C2

https://pastebin.com/raw/XtM6NbiR:1135

Attributes
  • Install_directory

    %AppData%

  • install_file

    WindowsSecurityWrapper.exe

  • pastebin_url

    https://pastebin.com/raw/XtM6NbiR

Extracted

Family

asyncrat

Version

L838 RAT v1.0.0

Botnet

Default

Mutex

gdgdgdgdggdawd

Attributes
  • delay

    3

  • install

    true

  • install_file

    WindowsSmartScanner.exe

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/vUf3YUgS

aes.plain

Targets

    • Target

      cheat_loader_v2.02___.bat

    • Size

      3KB

    • MD5

      eea245644e31da14d04d9cd773894249

    • SHA1

      838d855c89b7b9d4b84a8ff571b775dbf52a3fcb

    • SHA256

      fa37fb4035d2e946783605f105ddbc60accbe85035b99cd50c1add665c017c37

    • SHA512

      c86741059d06f349c4dcf089db5483d4bdaa10bdf728f3673e82167ff81a7495585d56b48faab6383f1d79aa02b202919a3a9c920f432f3b7f18595b679fb661

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Async RAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks