General
-
Target
27112024_0154_new.bat
-
Size
3KB
-
Sample
241127-cbkhraxlgk
-
MD5
6fc5138d9a459120a712b12ffd55ef44
-
SHA1
7ecb2535e52971cdde63a30fa2699d0d31de7af4
-
SHA256
25db2614bacd5fab235fae0dcf994833603604ed37173152c47f288733fa8418
-
SHA512
bc9462054d421efe81ab605d824cafcb603906b9523dc0bc16629a5d85ad96f81e738fac07a602b5ff46653a57e9571b6e5c257de9ca615a0b7c854f7738a497
Static task
static1
Behavioral task
behavioral1
Sample
27112024_0154_new.bat
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
Default
ghanarchydn.duckdns.org:7878
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
0.5.7B
Default
pdhasync.duckdns.org:8797
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
5.0.5
Venom Clients
ksjvenom.duckdns.org:8890
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
xworm
3.1
jkswrm3.duckdns.org:8895
novxrw9402.duckdns.org:9402
SilOfspMzdDQaw36
-
install_file
USB.exe
Extracted
xworm
5.0
jkwrm5.duckdns.org:8896
neSV4A0jHthIPf8y
-
install_file
USB.exe
Targets
-
-
Target
27112024_0154_new.bat
-
Size
3KB
-
MD5
6fc5138d9a459120a712b12ffd55ef44
-
SHA1
7ecb2535e52971cdde63a30fa2699d0d31de7af4
-
SHA256
25db2614bacd5fab235fae0dcf994833603604ed37173152c47f288733fa8418
-
SHA512
bc9462054d421efe81ab605d824cafcb603906b9523dc0bc16629a5d85ad96f81e738fac07a602b5ff46653a57e9571b6e5c257de9ca615a0b7c854f7738a497
-
Asyncrat family
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Async RAT payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-