Overview
overview
10Static
static
10rat-virus-...df.exe
windows7-x64
10rat-virus-...df.exe
windows10-2004-x64
10rat-virus-...df.exe
windows10-ltsc 2021-x64
10rat-virus-...df.exe
windows11-21h2-x64
10rat-virus-...en.exe
windows7-x64
10rat-virus-...en.exe
windows10-2004-x64
10rat-virus-...en.exe
windows10-ltsc 2021-x64
10rat-virus-...en.exe
windows11-21h2-x64
10rat-virus-...an.exe
windows7-x64
10rat-virus-...an.exe
windows10-2004-x64
10rat-virus-...an.exe
windows10-ltsc 2021-x64
10rat-virus-...an.exe
windows11-21h2-x64
10Analysis
-
max time kernel
1797s -
max time network
1800s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
03-12-2024 15:44
Behavioral task
behavioral1
Sample
rat-virus-DONT-INSTALL-main/gfdgdf.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
rat-virus-DONT-INSTALL-main/gfdgdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
rat-virus-DONT-INSTALL-main/gfdgdf.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
rat-virus-DONT-INSTALL-main/gfdgdf.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
rat-virus-DONT-INSTALL-main/ratka_dontopen.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
rat-virus-DONT-INSTALL-main/ratka_dontopen.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
rat-virus-DONT-INSTALL-main/ratka_dontopen.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
rat-virus-DONT-INSTALL-main/ratka_dontopen.exe
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
rat-virus-DONT-INSTALL-main/remota access trojan.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
rat-virus-DONT-INSTALL-main/remota access trojan.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
rat-virus-DONT-INSTALL-main/remota access trojan.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
rat-virus-DONT-INSTALL-main/remota access trojan.exe
-
Size
169KB
-
MD5
ca2667182ed67e8256e9a084c29f17b0
-
SHA1
0c0e38a58ae8cb33af4d99748cc87a38b74ee864
-
SHA256
0d6f8259f225d360a0a3d2470973faea74f776e75663b36e9eceb6edc0b1fa92
-
SHA512
53616632672de1497f9b50b761677458369b2934c6d16372f978e695c6b9a9d248a663466c38b888451114f2553232c89059d0ecd854803da17f492af62922e5
-
SSDEEP
3072:sqaFZ9jFOjCA2ewhLapuvpAsZOyMqmyBeYVYf:sbZ9t/GWGwqqm1
Malware Config
Extracted
xworm
5.0
saw-proceedings.gl.at.ply.gg:16297
sr2CYoJagZJqSlDE
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral11/memory/3716-1-0x0000000000550000-0x0000000000580000-memory.dmp family_xworm -
Xworm family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
remota access trojan.exedescription pid Process Token: SeDebugPrivilege 3716 remota access trojan.exe