General

  • Target

    VixenPrivate.exe

  • Size

    63KB

  • Sample

    241229-1sv8ksxrbj

  • MD5

    52d017d32bef7cffcb7ff98571736a97

  • SHA1

    f0764f6bec89063594e5afcf2233d586da2fa999

  • SHA256

    20e65c2d214ec536e42d4ce447afaa253b5cd9293fcd759e64023dd891dab6f2

  • SHA512

    538ea5e3b6516b63fe803a6e158b00a286fa3016df24a25f59e6a9b1ff3b01ad7876aff3efb8d474cf410d22db7b745698be46f6ae1f11ae819590607a2b999f

  • SSDEEP

    1536:SwXz4zflrUYJYUbBh9bFq7+MOGxuUdpqKmY7:SkUlbYUbBeFfGz

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

100.37.20.232:4872

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

xworm

C2

100.37.20.232:4872

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    XClient.exe

Targets

    • Target

      VixenPrivate.exe

    • Size

      63KB

    • MD5

      52d017d32bef7cffcb7ff98571736a97

    • SHA1

      f0764f6bec89063594e5afcf2233d586da2fa999

    • SHA256

      20e65c2d214ec536e42d4ce447afaa253b5cd9293fcd759e64023dd891dab6f2

    • SHA512

      538ea5e3b6516b63fe803a6e158b00a286fa3016df24a25f59e6a9b1ff3b01ad7876aff3efb8d474cf410d22db7b745698be46f6ae1f11ae819590607a2b999f

    • SSDEEP

      1536:SwXz4zflrUYJYUbBh9bFq7+MOGxuUdpqKmY7:SkUlbYUbBeFfGz

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

MITRE ATT&CK Enterprise v15

Tasks