General
-
Target
PureRcsAdvTokenGrabbernls..scr
-
Size
3.0MB
-
Sample
241220-rx1jesxmgy
-
MD5
29ee9836013142f0f63c6813944c7021
-
SHA1
90781c0a4d3fe85d1582eb1ca4c5aa910ee85b78
-
SHA256
7382071535d0b83a8ee62e72c29e8f42d433b29238c4c86cfba7c4de4d6ad6b1
-
SHA512
482d95357c48dbe380b90980a626fc04446de10e83e31dfbe850de94942091b86f01b83c2efe4517b887b8c288b0689e64809f5ad174deca759eeb9594d2e47e
-
SSDEEP
49152:oXWsTEkwghTKv4jysGUqgCoOtt1JKLBuhFapNyPn7MU4HcOL:oXFEkwghTKv4jysGUqgCxttiBmas7+8
Static task
static1
Behavioral task
behavioral1
Sample
PureRcsAdvTokenGrabbernls..scr
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
PureRcsAdvTokenGrabbernls..scr
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
0.5.7B
MetaMask
51.103.217.70:6677
MetaMask
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Google Chrome
51.103.217.70:8585
Google Chrome
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Windows Defender
51.103.217.70:8585
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
0.5.7B
Expoler
51.103.217.70:6677
Expoler
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
PureRcsAdvTokenGrabbernls..scr
-
Size
3.0MB
-
MD5
29ee9836013142f0f63c6813944c7021
-
SHA1
90781c0a4d3fe85d1582eb1ca4c5aa910ee85b78
-
SHA256
7382071535d0b83a8ee62e72c29e8f42d433b29238c4c86cfba7c4de4d6ad6b1
-
SHA512
482d95357c48dbe380b90980a626fc04446de10e83e31dfbe850de94942091b86f01b83c2efe4517b887b8c288b0689e64809f5ad174deca759eeb9594d2e47e
-
SSDEEP
49152:oXWsTEkwghTKv4jysGUqgCoOtt1JKLBuhFapNyPn7MU4HcOL:oXFEkwghTKv4jysGUqgCxttiBmas7+8
-
Asyncrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-