Resubmissions
28-11-2024 02:19
241128-cr9sks1kht 1027-11-2024 21:08
241127-zyzyaawqgn 1027-11-2024 20:16
241127-y145caymbs 1027-11-2024 20:13
241127-yzlxdavlen 1027-11-2024 19:53
241127-yl61dsxpcs 1027-11-2024 19:38
241127-ycrjcaxkfx 1027-11-2024 19:03
241127-xqsswsslej 1027-11-2024 19:03
241127-xqf44aslcr 327-11-2024 19:02
241127-xpxqfsslan 327-11-2024 18:32
241127-w6pkqs1mek 10Analysis
-
max time kernel
1007s -
max time network
1321s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-11-2024 18:32
Static task
static1
Behavioral task
behavioral1
Sample
Downloaders.zip
Resource
win11-20241023-en
General
-
Target
Downloaders.zip
-
Size
12KB
-
MD5
94fe78dc42e3403d06477f995770733c
-
SHA1
ea6ba4a14bab2a976d62ea7ddd4940ec90560586
-
SHA256
16930620b3b9166e0ffbd98f5d5b580c9919fd6ccdcc74fb996f53577f508267
-
SHA512
add85726e7d2c69068381688fe84defe820f600e6214eff029042e3002e9f4ad52dde3b8bb28f4148cca1b950cd54d3999ce9e8445c4562d1ef2efdb1c6bdeff
-
SSDEEP
384:6BfwcSEp9ZjKXSBIDv4dDfjlMJ7HWTHWB:efACW6Dr8HWTHWB
Malware Config
Extracted
https://bitbucket.org/superappsss/1/downloads/papa_hr_build.exe
Extracted
http://176.113.115.178/FF/3.png
Extracted
http://176.113.115.178/FF/2.png
Extracted
Protocol: ftp- Host:
216.146.202.21 - Port:
21 - Username:
admin - Password:
11111
Extracted
asyncrat
0.5.8
Default
ser.nrovn.xyz:6606
ser.nrovn.xyz:7707
ser.nrovn.xyz:8808
nfMlxLKxWkbD
-
delay
3
-
install
true
-
install_file
http.exe
-
install_folder
%AppData%
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
metasploit_stager
144.34.162.13:3333
Extracted
cobaltstrike
http://�'�)���@��@'��u�.Qt�,��R�y��b� ��6��'\�<C+xS��ǎ}���0IޭQ�}�W��x��R8�&w�}�+yq����R.�kem:2470497230)���@��@'��u�.Qt�,��R�y��b� ��6��'\�<C+xS��ǎ}���0IޭQ�}�W��x��R8�&w�}�+yq����R.�kem
Extracted
cryptbot
fivexc5pt.top
analforeverlovyu.top
-
url_path
/v1/upload.php
Extracted
quasar
1.3.0.0
sigorta
128.0.1.24:1604
QSR_MUTEX_rVykraFS4RvYG92h8I
-
encryption_key
Yjb2TFL9st7uVjRJpP63
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
xworm
147.185.221.22:47930
127.0.0.1:47930
-
Install_directory
%AppData%
-
install_file
svchost.exe
Extracted
xworm
5.0
68.178.207.33:7000
sSM7p4MT4JctLnRS
-
install_file
USB.exe
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
135.181.185.254:4449
212.15.49.155:4449
fssssssshsfhs444fdf%dfs
-
delay
11
-
install
false
-
install_folder
%AppData%
Extracted
lumma
https://p3ar11fter.sbs
https://3xp3cts1aim.sbs
https://owner-vacat10n.sbs
https://peepburry828.sbs
https://p10tgrace.sbs
https://befall-sm0ker.sbs
https://librari-night.sbs
https://processhol.sbs
https://cook-rain.sbs
Extracted
xworm
3.1
18.181.154.24:7000
w8DsMRIhXrOmk0Gn
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Asyncrat family
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Cobaltstrike family
-
Cryptbot family
-
Processes:
resource yara_rule behavioral1/memory/255756-10532-0x0000000000400000-0x0000000000585000-memory.dmp purplefox_rootkit behavioral1/memory/256992-10528-0x0000000000400000-0x0000000000585000-memory.dmp purplefox_rootkit behavioral1/memory/255264-10548-0x0000000000400000-0x0000000000585000-memory.dmp purplefox_rootkit behavioral1/memory/255756-10549-0x0000000000400000-0x0000000000585000-memory.dmp purplefox_rootkit -
Detect Xworm Payload 5 IoCs
Processes:
resource yara_rule behavioral1/files/0x001800000002aec3-4227.dat family_xworm behavioral1/memory/5332-4232-0x00000000004B0000-0x00000000004C8000-memory.dmp family_xworm behavioral1/files/0x001a00000002aedd-4320.dat family_xworm behavioral1/memory/5764-4327-0x0000000000C00000-0x0000000000C0E000-memory.dmp family_xworm behavioral1/memory/129424-7659-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm -
Gh0st RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/255756-10532-0x0000000000400000-0x0000000000585000-memory.dmp family_gh0strat behavioral1/memory/256992-10528-0x0000000000400000-0x0000000000585000-memory.dmp family_gh0strat behavioral1/memory/255264-10548-0x0000000000400000-0x0000000000585000-memory.dmp family_gh0strat behavioral1/memory/255756-10549-0x0000000000400000-0x0000000000585000-memory.dmp family_gh0strat -
Gh0strat family
-
Lumma family
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Phorphiex family
-
Phorphiex payload 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x001900000002ae15-2065.dat family_phorphiex -
Purplefox family
-
Processes:
7zFM.exedescription flow ioc Process 296 ip-api.com