General
-
Target
RNSM00286.7z
-
Size
7.5MB
-
Sample
241119-wnbwxsyqes
-
MD5
e9447647726a88a70f0dc67ae416e17b
-
SHA1
d644e20c30052bf957d3d0171f61c2f32e85a265
-
SHA256
a4e94a78ab31afc40468da08add417199669e94dd05cfb4d6c3eb1dae8f6490d
-
SHA512
9bcadcfed393d25f0ae302c73aba97f18ea4c653613709269fdbab2dc5264e40299db8dfc1d7df8fe56671b414f60f63ce1f557b24c311781631f57411e4fed4
-
SSDEEP
196608:uMeUa1P4CIExcOre/z4fDjpkKltFce1hUPjE8ab:NeUat1IwcJ/zUP7lseXd8ab
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00286.7z
Resource
win7-20241010-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+ihhcj.txt
http://t54ndnku456ngkwsudqer.wallymac.com/7B574CE5AE5C6BD
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/7B574CE5AE5C6BD
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/7B574CE5AE5C6BD
http://xlowfznrg4wf7dli.onion/7B574CE5AE5C6BD
Extracted
xtremerat
flashplayerupdate.sytes.net
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\HELP_RECOVER_instructions+aqg.txt
http://pren874bwsdbmbwe.returnyourfiless.ru/BAC3B4B424FB5DAB
http://i4sdmjn4fsdsdqfhu12l.orbyscabz.com/BAC3B4B424FB5DAB
http://rr48nfhdj5wedsm99324.tuttianent.at/BAC3B4B424FB5DAB
http://yez2o5lwqkmlv5lc.onion/BAC3B4B424FB5DAB
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+lwocl.txt
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/BAC3B4B424FB5DAB
http://b4youfred5485jgsa3453f.italazudda.com/BAC3B4B424FB5DAB
http://5rport45vcdef345adfkksawe.bematvocal.at/BAC3B4B424FB5DAB
http://fwgrhsao3aoml7ej.onion/BAC3B4B424FB5DAB
http://fwgrhsao3aoml7ej.ONION/BAC3B4B424FB5DAB
Targets
-
-
Target
RNSM00286.7z
-
Size
7.5MB
-
MD5
e9447647726a88a70f0dc67ae416e17b
-
SHA1
d644e20c30052bf957d3d0171f61c2f32e85a265
-
SHA256
a4e94a78ab31afc40468da08add417199669e94dd05cfb4d6c3eb1dae8f6490d
-
SHA512
9bcadcfed393d25f0ae302c73aba97f18ea4c653613709269fdbab2dc5264e40299db8dfc1d7df8fe56671b414f60f63ce1f557b24c311781631f57411e4fed4
-
SSDEEP
196608:uMeUa1P4CIExcOre/z4fDjpkKltFce1hUPjE8ab:NeUat1IwcJ/zUP7lseXd8ab
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3File Deletion
3