General

  • Target

    Proxy's Spoofer V2.exe

  • Size

    6.0MB

  • Sample

    241113-t5tryswaqj

  • MD5

    710df7d1b2f1b2ee6753747d5c04b346

  • SHA1

    294f0da01e406b2f58c132400385cb6f31d1c93e

  • SHA256

    aa8b6bfba812dcd1a85296a313cf859837394b9f917313abba64fa7678a110ed

  • SHA512

    b91a9e3cba368e6d3199f66817ab766e72ccc6556b8ee9abdaa50511e48fdb09ffa57b6548864f3e1b77fcdaeda7c30456aff90375fd3b3ee8267860f0fc2285

  • SSDEEP

    98304:aEv4T1+hACMzMtXqIEO8ODEO4bTFF+LocldaK3//LMAEyHBso06:yTYbUVO8gWF+LDraK37MvJ6

Malware Config

Extracted

Family

asyncrat

Version

Venom Pwn3rzs' Edtition v6.0.1

Botnet

Proxy

Mutex

0rU9DnsLkR

Attributes
  • delay

    1

  • install

    true

  • install_file

    NetworkEX.exe

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/RgYXYwVV

aes.plain

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    NetworkEXP.exe

  • pastebin_url

    https://pastebin.com/raw/RgYXYwVV

  • telegram

    https://api.telegram.org/bot6554307825:AAFiCM4YZlx7R1yb0K0d5pqenjePI2Nljfc/sendMessage?chat_id=6077384108

Targets

    • Target

      Proxy's Spoofer V2.exe

    • Size

      6.0MB

    • MD5

      710df7d1b2f1b2ee6753747d5c04b346

    • SHA1

      294f0da01e406b2f58c132400385cb6f31d1c93e

    • SHA256

      aa8b6bfba812dcd1a85296a313cf859837394b9f917313abba64fa7678a110ed

    • SHA512

      b91a9e3cba368e6d3199f66817ab766e72ccc6556b8ee9abdaa50511e48fdb09ffa57b6548864f3e1b77fcdaeda7c30456aff90375fd3b3ee8267860f0fc2285

    • SSDEEP

      98304:aEv4T1+hACMzMtXqIEO8ODEO4bTFF+LocldaK3//LMAEyHBso06:yTYbUVO8gWF+LDraK37MvJ6

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Deletes NTFS Change Journal

      The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Async RAT payload

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks