General
-
Target
Fello_s_Revenge.exe
-
Size
18.4MB
-
Sample
241008-z8jdaaxgnk
-
MD5
f8e1d9b436b1d95231ae33b44c6f165c
-
SHA1
bd4a588b9bbcd346fd0e4818da382ca241104d17
-
SHA256
23a6dc4cce379f0d6a85e0b2b09e66d0d0f370e9d610a84aa1810aab605a3976
-
SHA512
963f3ca6370d36d54d9034000e33198e9cfa8d54f7c70cf67e0e9be246a30bbd2db5f927c9dbb5edfebab3e255ece6023d3a2ed72715d1842519a9d2ff45a7f6
-
SSDEEP
393216:XpkQrjxkZI7X/exB5l7qqd6DqhDzeozX5dpYeewDuBnkeKyN:Xrr1kTz7qqAGdzpdFynkeKyN
Static task
static1
Behavioral task
behavioral1
Sample
Fello_s_Revenge.exe
Resource
win7-20240704-en
Malware Config
Extracted
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
Extracted
asyncrat
0.5.8
Default
127.0.0.1:51848
otherwise-puzzle.gl.at.ply.gg:51848
qsSOINsibBjw
-
delay
3
-
install
true
-
install_file
dwn.exe
-
install_folder
%AppData%
Extracted
xworm
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/0GcVDftp
Extracted
snakekeylogger
https://api.telegram.org/bot7148398804:AAESLKl9fVODMrpM8H4Wkq1Zbm-83PcMLro/sendMessage?chat_id=2135869667
Targets
-
-
Target
Fello_s_Revenge.exe
-
Size
18.4MB
-
MD5
f8e1d9b436b1d95231ae33b44c6f165c
-
SHA1
bd4a588b9bbcd346fd0e4818da382ca241104d17
-
SHA256
23a6dc4cce379f0d6a85e0b2b09e66d0d0f370e9d610a84aa1810aab605a3976
-
SHA512
963f3ca6370d36d54d9034000e33198e9cfa8d54f7c70cf67e0e9be246a30bbd2db5f927c9dbb5edfebab3e255ece6023d3a2ed72715d1842519a9d2ff45a7f6
-
SSDEEP
393216:XpkQrjxkZI7X/exB5l7qqd6DqhDzeozX5dpYeewDuBnkeKyN:Xrr1kTz7qqAGdzpdFynkeKyN
-
Adds autorun key to be loaded by Explorer.exe on startup
-
Detect Xworm Payload
-
Modifies firewall policy service
-
Snake Keylogger payload
-
Async RAT payload
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Installer Packages
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Installer Packages
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
10Obfuscated Files or Information
1Command Obfuscation
1Pre-OS Boot
1Bootkit
1System Binary Proxy Execution
1Msiexec
1