Overview
overview
10Static
static
10flashETHv.1.exe
windows7-x64
10flashETHv.1.exe
windows10-2004-x64
10S444.exe
windows7-x64
10S444.exe
windows10-2004-x64
10SYS.exe
windows7-x64
10SYS.exe
windows10-2004-x64
10USDT Flasher.exe
windows7-x64
3USDT Flasher.exe
windows10-2004-x64
3ss32.exe
windows7-x64
10ss32.exe
windows10-2004-x64
10winlogoc.exe
windows7-x64
10winlogoc.exe
windows10-2004-x64
10General
-
Target
flashETHv.1.exe
-
Size
701KB
-
Sample
241209-24t1bszldp
-
MD5
d57ac3c31d7069ee6a76c3572f5c234a
-
SHA1
e6f3b23343a9b716c7529d282a2322c1f528b576
-
SHA256
e73c96538ec60c2117b6ed82b7f95f8894abed022ee9ab03c1be90ebd9722f06
-
SHA512
cb4334c76c427305b9b83f2d110e75827c4a83d296679aa04876ccbfd35c7787014a914b722348c076f5d2a3f306f98fdced54ad967953af4ad25d3f3c9eb529
-
SSDEEP
12288:YwEWeJxd5eyh4R0a6mQlRkORS2DNIWWo0dK+/rYtlsfhZDFyJ/b9A64YVNSANzNc:YBfneyh4R0NPRFXBJWo0dK+/sjkhZZyM
Behavioral task
behavioral1
Sample
flashETHv.1.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
flashETHv.1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
S444.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
S444.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
SYS.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
SYS.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
USDT Flasher.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
USDT Flasher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ss32.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ss32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
winlogoc.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
winlogoc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7170788789:AAFDgtgiOhG8owpmypRYbNLRYrxlniuiyIs/sendMessage?chat_id=6101540297
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
xworm
SLL.casacam.net:4444
-
Install_directory
%LocalAppData%
-
install_file
Interrupi.exe
Extracted
https://github.com/NGROKC/CTC/raw/main/CTC64.dll
Targets
-
-
Target
flashETHv.1.exe
-
Size
701KB
-
MD5
d57ac3c31d7069ee6a76c3572f5c234a
-
SHA1
e6f3b23343a9b716c7529d282a2322c1f528b576
-
SHA256
e73c96538ec60c2117b6ed82b7f95f8894abed022ee9ab03c1be90ebd9722f06
-
SHA512
cb4334c76c427305b9b83f2d110e75827c4a83d296679aa04876ccbfd35c7787014a914b722348c076f5d2a3f306f98fdced54ad967953af4ad25d3f3c9eb529
-
SSDEEP
12288:YwEWeJxd5eyh4R0a6mQlRkORS2DNIWWo0dK+/rYtlsfhZDFyJ/b9A64YVNSANzNc:YBfneyh4R0NPRFXBJWo0dK+/sjkhZZyM
-
Asyncrat family
-
Detect Xworm Payload
-
R77 family
-
StormKitty payload
-
Stormkitty family
-
Xworm family
-
r77 rootkit payload
Detects the payload of the r77 rootkit.
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
-
-
Target
S444.exe
-
Size
33KB
-
MD5
17e158e0f91dcc8168f2e416035926ed
-
SHA1
aac8bf1174db86568aab282b8a8de953c372ef1e
-
SHA256
bb0ef384a2d6f8fff82eecd15908bd39146ffa65810c2c56934c32c88abac94b
-
SHA512
383df3fa4eaecbfc6698961d3a8f5fe726db3e0cddf83f357bc9f2947328a284f4fe5b13f2eb866ea9c50eafbb5fc45b788b8401edffcbfc5bf068f545dd167c
-
SSDEEP
768:WdQHdYES3hnpwEC/uc/zBaP09K737hNWhlLF:W7x8zgs9W37hMPJ
-
R77 family
-
r77 rootkit payload
Detects the payload of the r77 rootkit.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
SYS.exe
-
Size
226KB
-
MD5
1bf114677a69802600ff29c5ce65f464
-
SHA1
9d05e8414eea793f8260bfb05f359c9b056c7e43
-
SHA256
57b0c0581e640d275739c192361ec44d4d2af6db1dc74ea4e7e77e1c5e666736
-
SHA512
d111b149ef24c165976dd37a16e5525f73752a4f3ec66d0cf4faace019e27a8e09815655bbdfe428791dbda365e1172819a820df19d0a5647f21fcadf1afabe2
-
SSDEEP
3072:S+STW8djpN6izj8mZw7qe73gROUbBK+QIuhuDGRTgVK6+Wpd:P8XN6W8mm7qeJUbopIIeK
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
-
-
Target
USDT Flasher.exe
-
Size
775KB
-
MD5
8584a85ec4f91388e65c963c2b458f33
-
SHA1
023812da246e015601307c357cd4c685df28977c
-
SHA256
a4c72195c7e45148d8c98c6a58c9c71dc480d496c2daad053b4bfab581225f62
-
SHA512
b72bb8d9b842c145c5f3b0a2dfb9eac21e297c871388150386e5f74f4946e8a616e597a3d7a63eff8919789c9527f2f4e4861b4f76ff3713c80c292e9105e9f6
-
SSDEEP
24576:2yGWSbe8meoiy7XlHEVVLaGWSbezGWSbey4RSbe:5X1EVVL
Score3/10 -
-
-
Target
ss32.exe
-
Size
94KB
-
MD5
cbe1be5547cc26f924d6fa48b4abca92
-
SHA1
972f9afdb39425a4764be0a91552613e49eba7f3
-
SHA256
549565dab31274ecd5370f02766116260e56390b405231ddaf3a7186395f1d9f
-
SHA512
be567464ab80a4c00f7b499c1b645cf2ef301242a5feffad1b6dca8b2281f066a9f0ae63fbf8715c3e3c3b0dc6c8e1093d057ff245c5de5f8b39da37eb56a272
-
SSDEEP
1536:GW4ZYDn38RoEv9fEonXRyoZX7rhC5Hg4P0lALoVrZ+hR40qvUusn47k:GW4Zs38pvBXn/nhgHg43LsUnqMusn47k
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
winlogoc.exe
-
Size
72KB
-
MD5
33fba80c2580eebf95e25dea03331f68
-
SHA1
d0ed67fbbff537eb393206fc41c18d59b9a4bb3c
-
SHA256
4cbe94aefe8a24ebac9fb5c11c1efc89c15b1a7b1a2bf3587baface318ee4b2b
-
SHA512
8213c45c68a38984a2ad11ab0651ae9933dc538ff260e31753f2f9c3aacff038048bcf2680bb7993b5f4005f48ae7e5c74e7325bdf6ef20df1ae7aa58f7ae4bc
-
SSDEEP
1536:UzF1OeqsJlPPf/TpX0bOc2yu/n+77QOI3taVwi4y:yFBibOL/nSsOI3tR5y
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2AppInit DLLs
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2AppInit DLLs
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1