General
-
Target
RNSM00319.7z
-
Size
12.2MB
-
Sample
241112-xqzlfaskhl
-
MD5
e653fa79ad8314e2aa0168025a42c82d
-
SHA1
b56f8b3110d72c77e54ba7dd273537a99accf7ef
-
SHA256
84c78672f9e5510ef56bb2ee04a2e50b5a42272f534e2acb120ff0153026055f
-
SHA512
eca11e36ea634f772c9ecb1a14ab8a09e811e08ae67acf8fb311b3bd3cf58f3538b0e91d188e159626f065d0ddf1e3b67504487807ec006c54ed73b0c587e1b6
-
SSDEEP
196608:U1ltYMKrBYEDnnl6SGKvSIlkYYDAhU8EVg7pSkawU2tTKRq2yU2vQx:UBYJtDl/htrYYCg1S3LRq2yUsQ
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00319.7z
Resource
win7-20241010-en
Malware Config
Extracted
xtremerat
shigra.sytes.net
Extracted
C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\!HELP_YOUR_FILES.HTML
class='style5'>[email protected]</span>
http-equiv='Content-Type
Extracted
lokibot
http://molinolatebaida.com/basic-jquery-slider-8ffe118/js/lib/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
RNSM00319.7z
-
Size
12.2MB
-
MD5
e653fa79ad8314e2aa0168025a42c82d
-
SHA1
b56f8b3110d72c77e54ba7dd273537a99accf7ef
-
SHA256
84c78672f9e5510ef56bb2ee04a2e50b5a42272f534e2acb120ff0153026055f
-
SHA512
eca11e36ea634f772c9ecb1a14ab8a09e811e08ae67acf8fb311b3bd3cf58f3538b0e91d188e159626f065d0ddf1e3b67504487807ec006c54ed73b0c587e1b6
-
SSDEEP
196608:U1ltYMKrBYEDnnl6SGKvSIlkYYDAhU8EVg7pSkawU2tTKRq2yU2vQx:UBYJtDl/htrYYCg1S3LRq2yUsQ
-
Adwind family
-
Class file contains resources related to AdWind
-
Detect XtremeRAT payload
-
GandCrab payload
-
Gandcrab family
-
Lokibot family
-
Modifies visiblity of hidden/system files in Explorer
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Renames multiple (164) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
6Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1