General
-
Target
06112024_0119_new.bat
-
Size
44KB
-
Sample
241106-bpr93ssdke
-
MD5
0a8189409a127612b858f940e3410212
-
SHA1
44e4fd543179b18b9565c6ce4145ff61ab75e7f0
-
SHA256
6ef23d5f69695cd8c9381e416928ca10e33a0b927c451399ab439eb64007a5ec
-
SHA512
e4af985ebe31d0beae17999c893c7ad6824684caf863439f676a2dae9b2a6da74eddb41ca58b54aade9fb5ffabe93bd1a2db6ac21fe87f94b5d66c0a354b677d
-
SSDEEP
768:gTYcpQyuPmhDGEhtKC+5Vcc8xJWWAF/U61RPMrQqMgrrLFAvzUk+imrt0wLm2PoL:gTYcpQyuPmhDGEhtKC2Vc93WWApUkPMy
Static task
static1
Behavioral task
behavioral1
Sample
06112024_0119_new.bat
Resource
win7-20240729-en
Malware Config
Extracted
asyncrat
Default
ghanarchydn.duckdns.org:7878
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
0.5.7B
Default
pdhasync.duckdns.org:8797
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
5.0.5
Venom Clients
ksjvenom.duckdns.org:8890
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
xworm
3.1
jkswrm3.duckdns.org:8895
xroct9402.duckdns.org:9402
SilOfspMzdDQaw36
-
install_file
USB.exe
Extracted
xworm
5.0
jkwrm5.duckdns.org:8896
neSV4A0jHthIPf8y
-
install_file
USB.exe
Targets
-
-
Target
06112024_0119_new.bat
-
Size
44KB
-
MD5
0a8189409a127612b858f940e3410212
-
SHA1
44e4fd543179b18b9565c6ce4145ff61ab75e7f0
-
SHA256
6ef23d5f69695cd8c9381e416928ca10e33a0b927c451399ab439eb64007a5ec
-
SHA512
e4af985ebe31d0beae17999c893c7ad6824684caf863439f676a2dae9b2a6da74eddb41ca58b54aade9fb5ffabe93bd1a2db6ac21fe87f94b5d66c0a354b677d
-
SSDEEP
768:gTYcpQyuPmhDGEhtKC+5Vcc8xJWWAF/U61RPMrQqMgrrLFAvzUk+imrt0wLm2PoL:gTYcpQyuPmhDGEhtKC2Vc93WWApUkPMy
-
Asyncrat family
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Async RAT payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-