General

  • Target

    27112024_0154_new.bat

  • Size

    3KB

  • Sample

    241127-cbkhraxlgk

  • MD5

    6fc5138d9a459120a712b12ffd55ef44

  • SHA1

    7ecb2535e52971cdde63a30fa2699d0d31de7af4

  • SHA256

    25db2614bacd5fab235fae0dcf994833603604ed37173152c47f288733fa8418

  • SHA512

    bc9462054d421efe81ab605d824cafcb603906b9523dc0bc16629a5d85ad96f81e738fac07a602b5ff46653a57e9571b6e5c257de9ca615a0b7c854f7738a497

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

ghanarchydn.duckdns.org:7878

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

pdhasync.duckdns.org:8797

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

ksjvenom.duckdns.org:8890

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

xworm

Version

3.1

C2

jkswrm3.duckdns.org:8895

novxrw9402.duckdns.org:9402

Mutex

SilOfspMzdDQaw36

Attributes
  • install_file

    USB.exe

aes.plain
aes.plain

Extracted

Family

xworm

Version

5.0

C2

jkwrm5.duckdns.org:8896

Mutex

neSV4A0jHthIPf8y

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      27112024_0154_new.bat

    • Size

      3KB

    • MD5

      6fc5138d9a459120a712b12ffd55ef44

    • SHA1

      7ecb2535e52971cdde63a30fa2699d0d31de7af4

    • SHA256

      25db2614bacd5fab235fae0dcf994833603604ed37173152c47f288733fa8418

    • SHA512

      bc9462054d421efe81ab605d824cafcb603906b9523dc0bc16629a5d85ad96f81e738fac07a602b5ff46653a57e9571b6e5c257de9ca615a0b7c854f7738a497

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Async RAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks