General

  • Target

    3264d09d3a398417226b7d346c2fc4757ffa445373763e2d7c2f18ef6edb2354

  • Size

    6.6MB

  • MD5

    ed24b048880a8a2a3b7ac4911a7e81df

  • SHA1

    80f631b5481ec48729c3a738dc7ab003b4cd61c1

  • SHA256

    3264d09d3a398417226b7d346c2fc4757ffa445373763e2d7c2f18ef6edb2354

  • SHA512

    fab270e82961ecf6c1db9a53eb0dc81b0a3d6251b39421486dfa6e6f20826577c2db0624444de39f8a91465fb5ab1530e5530480cdc9b5b33b8ab260350bfe2f

  • SSDEEP

    196608:Xx3sgZH4wNNHmaqTE6kTcSzCkNBcjx3sgZdJ:h8CnDm7HORBcF8CdJ

Malware Config

Extracted

Family

xworm

Version

3.0

C2

topics-junior.at.ply.gg:45283

Mutex

7K8kkC78j4IfMAr6

Attributes
  • Install_directory

    %AppData%

  • install_file

    wininit.exe

aes.plain

Extracted

Family

quasar

Version

1.4.0

Botnet

Test

C2

scambaiting2022.ddns.net:25565

192.168.1.3:25565

Mutex

41845399-4858-4791-bd1c-b2526f38e8cc

Attributes
  • encryption_key

    77693888CF811B44AE75658ADBCA8897192A96FF

  • install_name

    update.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Chrome Update

  • subdirectory

    Chrome

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://54.208.157.120:80/Night_uac/amsi.ps1

ps1.dropper

http://54.208.157.120:80/Night_uac/uac.ps1

ps1.dropper

http://54.208.157.120:80/Night_uac/command.ps1

ps1.dropper

http://54.208.157.120:80/Night_uac/down.ps1

Extracted

Language
ps1
Source
URLs
exe.dropper

http://54.208.157.120:80/Night_uac/Uac_main.ps1

exe.dropper

http://54.208.157.120:80/Night_uac/payloads/9usd7yge.ps1

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://54.208.157.120:80/winlogin.exe

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

16.ip.gl.ply.gg:56795

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

127.0.0.1:10001

127.0.0.1:9147

windowsddns.duckdns.org:6606

windowsddns.duckdns.org:7707

windowsddns.duckdns.org:8808

windowsddns.duckdns.org:10001

windowsddns.duckdns.org:9147

country-wellness.gl.at.ply.gg:6606

country-wellness.gl.at.ply.gg:7707

country-wellness.gl.at.ply.gg:8808

country-wellness.gl.at.ply.gg:10001

country-wellness.gl.at.ply.gg:9147

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    Days Out.exe

  • install_folder

    %AppData%

aes.plain
aes.plain

Extracted

Family

njrat

Version

im523

Botnet

scammer

C2

topics-junior.at.ply.gg:45283

Mutex

87fbb7d05011dd3c6b564f136007bf19

Attributes
  • reg_key

    87fbb7d05011dd3c6b564f136007bf19

  • splitter

    |'|'|

Extracted

Family

quasar

Version

1.4.1

Botnet

My VM

C2

myownvm.anondns.net:13832

37.120.141.165:13832

server1.trustedvpnservices.com:13832

higradevpn.xyz:13832

Mutex

071e2576-e94a-492e-8303-baae1cb4641c

Attributes
  • encryption_key

    402F6F1B2F63357285F585A5880FBC2C0F468F55

  • install_name

    ShellExperienceHost.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Shell Experience Host

  • subdirectory

    drivers

Extracted

Family

orcus

Botnet

Scammers

C2

44.203.122.41:1604

Mutex

b040a0c11d1a4273bc5428c0c9cb2c5b

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %appdata%\Orcus\explorer.exe

  • reconnect_delay

    9000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\AnyDex.exe

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://54.208.157.120:80/scambtr_uac/amsi.ps1

ps1.dropper

http://54.208.157.120:80/scambtr_uac/uac.ps1

ps1.dropper

http://54.208.157.120:80/scambtr_uac/command.ps1

ps1.dropper

http://54.208.157.120:80/scambtr_uac/down.ps1

Extracted

Language
ps1
Source
URLs
exe.dropper

http://54.208.157.120:80/scambtr_uac/Uac_main.ps1

exe.dropper

http://54.208.157.120:80/scambtr_uac/payloads/fm1ri21p.ps1

Extracted

Family

xworm

Version

3.1

C2

miles-c.at.ply.gg:49826

Mutex

qzx0AtyVDsrQphps

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Extracted

Family

xworm

C2

180.ip.ply.gg:48892

Mutex

QWgaicbZP6H1puz7

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Async RAT payload 2 IoCs
  • Asyncrat family
  • Detect Xworm Payload 3 IoCs
  • Nanocore family
  • Njrat family
  • Orcurs Rat Executable 1 IoCs
  • Orcus family
  • Orcus main payload 1 IoCs
  • Quasar family
  • Quasar payload 3 IoCs
  • Xworm family
  • Unsigned PE 13 IoCs

    Checks for missing Authenticode signature.

Files

  • 3264d09d3a398417226b7d346c2fc4757ffa445373763e2d7c2f18ef6edb2354
    .zip
  • AnyDesk.exe
    .exe windows:6 windows x64 arch:x64

    310b1cc8abef97edfcabf0ed406947cf


    Code Sign

    Headers

    Imports

    Exports

    Sections

  • Archevod_XWorm.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • ClickMe.lnk.download
    .lnk
  • Cmstp.bat
    .bat .vbs
  • GoogleChrome.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • Hidden_Undected_CMSTP-Reflection.ps1.bak
    .ps1
  • Hidden_magic.vbs
    .vbs
  • Manage.bat
  • Night.tar.gz
    .gz
  • Night.tar
    .tar .ps1 polyglot
  • Night_uac/Uac_main.ps1
  • Night_uac/Uac_stage.ps1
    .ps1
  • Night_uac/Uac_stage_gen.py
    .py .ps1
  • Night_uac/amsi.ps1
    .ps1
  • Night_uac/amsi.ps1.bak
    .ps1
  • Night_uac/command.ps1
  • Night_uac/down.ps1
    .ps1
  • Night_uac/payloads/0malm7gp.ps1
  • Night_uac/payloads/264emg58.ps1
  • Night_uac/payloads/7802ym6n.ps1
  • Night_uac/payloads/9usd7yge.ps1
  • Night_uac/payloads/fzrplyej.ps1
  • Night_uac/payloads/jn2qnx41.ps1
  • Night_uac/payloads/qs14offn.ps1
  • Night_uac/payloads/remove_all.sh
  • Night_uac/payloads/t9r3mczo.ps1
  • Night_uac/payloads/v6vfu81h.ps1
  • Night_uac/uac.ps1
    .ps1
  • Night_magic.bat
    .bat .vbs
  • Runtimebroker.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • ShellExperienceHost.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • Svchost.exe
    .exe windows:6 windows x64 arch:x64

    310b1cc8abef97edfcabf0ed406947cf


    Headers

    Imports

    Exports

    Sections

  • Svchost.vbs
    .vbs
  • UltraViewerUpdateService.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • Uni.vbs
    .vbs
  • explorer_orcus.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • fodV2.bat
    .bat .vbs
  • fontdrvhost.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • paypal.rtf
    .rtf
  • scambtr.tar.gz
    .gz
  • scambtr.tar
    .tar .ps1 polyglot
  • scambtr_uac/Uac_main.ps1
  • scambtr_uac/Uac_stage.ps1
    .ps1
  • scambtr_uac/Uac_stage_gen.py
    .py .ps1
  • scambtr_uac/amsi.ps1
    .ps1
  • scambtr_uac/command.ps1
  • scambtr_uac/down.ps1
    .ps1
  • scambtr_uac/payloads/fm1ri21p.ps1
  • scambtr_uac/payloads/remove_all.sh
  • scambtr_uac/uac.ps1
    .ps1
  • spoolsvc.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • taskhosts.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • vnchooks.dll
    .dll windows:6 windows x64 arch:x64

    d2181aeca5f4d84ebf9b4656dd8a9ba2


    Code Sign

    Headers

    Imports

    Exports

    Sections

  • winlogin.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • winvnc.exe
    .exe windows:6 windows x64 arch:x64

    310b1cc8abef97edfcabf0ed406947cf


    Code Sign

    Headers

    Imports

    Exports

    Sections

  • wlms.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections