General
-
Target
new.bat
-
Size
13.0MB
-
Sample
241013-kbddfa1ejq
-
MD5
fa7d31fe5607567d7240f15f27a7fd08
-
SHA1
192e1240b664bdee1ac923c12af86d0552bd9774
-
SHA256
830b295a70e3db6aa9e9c343bc76b59015cf1e88124efaae9713d726b6381cd2
-
SHA512
e57ce88a41c1014189b4b4ebeda0f660cb23251fda834de5be591859b5769b6fb0b368be5634072f8083add8401abec4d92beb668263b7458571b70f94b7f4fd
-
SSDEEP
96:q8kfEa9L03YTZEc/LsZHbwWzDI469xmnZuw1OnfnMn3BonlMS/yN+6uVF/xx6t8W:gfEa5TT0tZ8EriC
Static task
static1
Malware Config
Extracted
asyncrat
Default
nanarchym.duckdns.org:7878
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
0.5.7B
Default
modsmasync.duckdns.org:6745
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
5.0.5
Venom Clients
momehvenom.duckdns.org:8520
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
xworm
5.0
xwrmmone.duckdns.org:9390
x5wo9402sep.duckdns.org:9402
jg6HwHbepPocwygj
-
install_file
USB.exe
Extracted
xworm
3.1
momekxwrm.duckdns.org:8292
yh66xbyAobQEOS5f
-
install_file
USB.exe
Targets
-
-
Target
new.bat
-
Size
13.0MB
-
MD5
fa7d31fe5607567d7240f15f27a7fd08
-
SHA1
192e1240b664bdee1ac923c12af86d0552bd9774
-
SHA256
830b295a70e3db6aa9e9c343bc76b59015cf1e88124efaae9713d726b6381cd2
-
SHA512
e57ce88a41c1014189b4b4ebeda0f660cb23251fda834de5be591859b5769b6fb0b368be5634072f8083add8401abec4d92beb668263b7458571b70f94b7f4fd
-
SSDEEP
96:q8kfEa9L03YTZEc/LsZHbwWzDI469xmnZuw1OnfnMn3BonlMS/yN+6uVF/xx6t8W:gfEa5TT0tZ8EriC
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-