General
-
Target
cheat_loader_v2.02___.bat
-
Size
3KB
-
Sample
240929-31dpls1cph
-
MD5
eea245644e31da14d04d9cd773894249
-
SHA1
838d855c89b7b9d4b84a8ff571b775dbf52a3fcb
-
SHA256
fa37fb4035d2e946783605f105ddbc60accbe85035b99cd50c1add665c017c37
-
SHA512
c86741059d06f349c4dcf089db5483d4bdaa10bdf728f3673e82167ff81a7495585d56b48faab6383f1d79aa02b202919a3a9c920f432f3b7f18595b679fb661
Static task
static1
Behavioral task
behavioral1
Sample
cheat_loader_v2.02___.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cheat_loader_v2.02___.bat
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
https://pastebin.com/raw/XtM6NbiR:1135
-
Install_directory
%AppData%
-
install_file
WindowsSecurityWrapper.exe
-
pastebin_url
https://pastebin.com/raw/XtM6NbiR
Extracted
asyncrat
L838 RAT v1.0.0
Default
gdgdgdgdggdawd
-
delay
3
-
install
true
-
install_file
WindowsSmartScanner.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/vUf3YUgS
Targets
-
-
Target
cheat_loader_v2.02___.bat
-
Size
3KB
-
MD5
eea245644e31da14d04d9cd773894249
-
SHA1
838d855c89b7b9d4b84a8ff571b775dbf52a3fcb
-
SHA256
fa37fb4035d2e946783605f105ddbc60accbe85035b99cd50c1add665c017c37
-
SHA512
c86741059d06f349c4dcf089db5483d4bdaa10bdf728f3673e82167ff81a7495585d56b48faab6383f1d79aa02b202919a3a9c920f432f3b7f18595b679fb661
-
Detect Xworm Payload
-
Async RAT payload
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-