General
-
Target
241204-p9yjgs1nbp_pw_infected.zip
-
Size
14.1MB
-
Sample
241204-qme93awpgz
-
MD5
ffddb4d8714809e17e1e1b19cb085b8c
-
SHA1
e7b635844b198af1e84fe00aad8c322eeafea51a
-
SHA256
74d74bfdd9852c7967a852d632c16dc347b358fead85c04b04a809d9a35fb2c9
-
SHA512
26cece41f6bb1903398813116c0fc27a25c205ee0ae6ae930fe7fe263f60cb86a0cfc76c40cef5851671e7c11191a8e45b27b1ef55222b6575abe7bf2cfe309e
-
SSDEEP
393216:kBkHW+0ozLt+tYFj37O1/CKw+JFu/HObglFPh8OW:k+HN7LtFp37O1/yC7gbPU
Behavioral task
behavioral1
Sample
niggers.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
take3.pyc
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
https://176.111.174.138/usersync/tradedesk/_rp
Extracted
https://osecweb.ir/js/config_20.ps1
Extracted
http://176.113.115.178/FF/2.png
Extracted
http://176.113.115.178/FF/3.png
Extracted
xworm
5.0
week-dictionary.gl.at.ply.gg:12466
WIHzy7HOqD8TiFlq
-
Install_directory
%AppData%
-
install_file
PowerShell.exe
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
metasploit_stager
144.34.162.13:3333
Extracted
lumma
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://hallowed-noisy.sbs
Extracted
asyncrat
| Edit 3LOSH RAT
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
MSF
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
quasar
1.4.1
SGVP
192.168.1.9:4782
150.129.206.176:4782
Ai-Sgvp-33452.portmap.host:33452
a35ec7b7-5a95-4207-8f25-7af0a7847fa5
-
encryption_key
09BBDA8FF0524296F02F8F81158F33C0AA74D487
-
install_name
User Application Data.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windowns Client Startup
-
subdirectory
Quasar
Extracted
quasar
1.4.1
Office04
14.243.221.170:2654
a7b38fdd-192e-4e47-b9ba-ca9eb81cc7bd
-
encryption_key
8B9AD736E943A06EAF1321AD479071E83805704C
-
install_name
Runtime Broker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Runtime Broker
-
subdirectory
SubDir
Targets
-
-
Target
niggers.exe
-
Size
14.3MB
-
MD5
8a44ee98217bc81f0869d793eefab1f0
-
SHA1
4756ed10cbf5dbad09746a8fa2c2e62c2f2b7200
-
SHA256
c26e2475ef60ba969bb66c9b464b498efb1da0bf7360ff7545c1db3b707bdbed
-
SHA512
4f18f54d791929cb24c02e8865d520e6263c096bef7ebd422578bca0600cadb6ea4b046654ef007ba056bf568ff3a19b068bf4313b4a218953a5bd2ecb0e6a02
-
SSDEEP
393216:vOWd863huc1dQJlAwF3MnG3InVFedWm7NS/xHWgnHz:2893hr1dQ53MG4VAHsT
-
AmmyyAdmin payload
-
Ammyyadmin family
-
Asyncrat family
-
Detect Neshta payload
-
Detect Xworm Payload
-
Lumma family
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Njrat family
-
Quasar family
-
Quasar payload
-
Ta505 family
-
XMRig Miner payload
-
Xmrig family
-
Xworm family
-
Async RAT payload
-
ModiLoader Second Stage
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Indicator Removal: Network Share Connection Removal
Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.
-
Modifies Windows Firewall
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
-
-
Target
take3.pyc
-
Size
5KB
-
MD5
4a9013e03843a3c5549540fa2dffd97c
-
SHA1
642b3d516cce79edfcc4881ebf8c142615a25b38
-
SHA256
2dbcec9abf205c40869539313ee711323d62f442181f5d3eeceb8ecb6130c3b7
-
SHA512
8212bdc9cff937ded41a2f5c666a6755b39841cdb3316ba9abc08f32a6f356d01e21ce1d75007ea8240082c950f59f6ccc07b4eacaa15008fe074bc1bd1874dd
-
SSDEEP
96:D9sxJIAI8lQAcPTwt0Ss3NYQfmkaHiiHj2xWhp5EJp:hsxJIAI8GHPNLVA92Op5O
Score3/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Create or Modify System Process
3Windows Service
3Modify Authentication Process
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify System Firewall
1Indicator Removal
1Network Share Connection Removal
1Modify Authentication Process
1