General
-
Target
22112024_0201_new.bat
-
Size
3KB
-
Sample
241122-cflavasjbt
-
MD5
58ce685ec1ce8644306dc4906242dcb7
-
SHA1
2f9dc4432e1d211e54aab97831fc3b0df5e86df2
-
SHA256
5ecc7f700bde0ab833e9a955d8ad371fab96e5a8c52d148488201e7815973725
-
SHA512
249ea3b3477cda22985e504f2a028ef370cc06fc4bd6655a7d18ecb26e0329e981720ccf234932e155b70a99131b95a62f8324ebcabe3652ec3b5c0c23fd0186
Static task
static1
Behavioral task
behavioral1
Sample
22112024_0201_new.bat
Resource
win7-20241010-en
Malware Config
Extracted
asyncrat
Default
ghanarchydn.duckdns.org:7878
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
0.5.7B
Default
pdhasync.duckdns.org:8797
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
xworm
3.1
jkswrm3.duckdns.org:8895
xroct9402.duckdns.org:9402
SilOfspMzdDQaw36
-
install_file
USB.exe
Extracted
xworm
5.0
jkwrm5.duckdns.org:8896
neSV4A0jHthIPf8y
-
install_file
USB.exe
Targets
-
-
Target
22112024_0201_new.bat
-
Size
3KB
-
MD5
58ce685ec1ce8644306dc4906242dcb7
-
SHA1
2f9dc4432e1d211e54aab97831fc3b0df5e86df2
-
SHA256
5ecc7f700bde0ab833e9a955d8ad371fab96e5a8c52d148488201e7815973725
-
SHA512
249ea3b3477cda22985e504f2a028ef370cc06fc4bd6655a7d18ecb26e0329e981720ccf234932e155b70a99131b95a62f8324ebcabe3652ec3b5c0c23fd0186
-
Asyncrat family
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Async RAT payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-