General
-
Target
https://cdn.discordapp.com/attachments/1287115741262381116/1289389733733994496/cheat_loader_v2.02___.bat?ex=66fbf104&is=66fa9f84&hm=7f5fc9509d57b1d8ea7b094a7492a32f57b0f2fc7b495c403c2dda4f9bb64a41&
-
Sample
240930-19d1maxgmn
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1287115741262381116/1289389733733994496/cheat_loader_v2.02___.bat?ex=66fbf104&is=66fa9f84&hm=7f5fc9509d57b1d8ea7b094a7492a32f57b0f2fc7b495c403c2dda4f9bb64a41&
Resource
win10v2004-20240802-en
Malware Config
Extracted
asyncrat
L838 RAT v1.0.0
Default
fhthtfhfthawda
-
delay
3
-
install
true
-
install_file
WindowsSmartScanner.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/vUf3YUgS
Extracted
xworm
https://pastebin.com/raw/XtM6NbiR:1135
-
Install_directory
%AppData%
-
install_file
WindowsSecurityWrapper.exe
-
pastebin_url
https://pastebin.com/raw/XtM6NbiR
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1287115741262381116/1289389733733994496/cheat_loader_v2.02___.bat?ex=66fbf104&is=66fa9f84&hm=7f5fc9509d57b1d8ea7b094a7492a32f57b0f2fc7b495c403c2dda4f9bb64a41&
-
Detect Xworm Payload
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-