General
-
Target
241212-wymq6ssnat_pw_infected.zip
-
Size
8KB
-
Sample
250101-xkqrca1lal
-
MD5
46e1dda34049ae02d12417a9ca4254a8
-
SHA1
a9f38b7196980f20c3fee1172538db73f2065284
-
SHA256
ba3b60449327330b4e55df4528ebcfb7b12cd3e51c16d8b56680314e43d72be2
-
SHA512
92f17e843d624c20ad16360ed855ff1c02895379a83bd2054374f0a6f9ee3697cdee1b4d38b3833bd2c784f45504541729c29c66275eaa7f137d6d47ab340afb
-
SSDEEP
192:bxH3A0QJWWqMk3Vp/c8hUwuz4TV3JYih6wEpby+Od7/60i2j:bxHNpfVl2bzFWDE9o/60p
Static task
static1
Behavioral task
behavioral1
Sample
241212-wymq6ssnat_pw_infected.zip
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://ftp.hogarsancamilo.org/ - Port:
21 - Username:
[email protected] - Password:
eg0wtRsF5HKA
Extracted
xworm
5.0
panpoppo-25611.portmap.io:25611
bkYwUfZceyxwRCdw
-
Install_directory
%AppData%
-
install_file
System.exe
-
telegram
https://api.telegram.org/bot7029474494:AAH1z4aA2-VnubfHzTm9hl-5PQmAMfTuggo/sendMessage?chat_id=5258405739
Extracted
quasar
1.4.1
Helper Atanka
193.203.238.136:8080
14f39659-ca5b-4af7-8045-bed3500c385f
-
encryption_key
11049F2AEBDCF8E3A57474CD5FBA40FB2FFC5424
-
install_name
diskutil.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
diskutil
-
subdirectory
diskutil
Extracted
quasar
1.4.1
Office04
91.92.254.40:4782
56928f7b-c5c9-4b24-af59-8c509ce1d27e
-
encryption_key
60574F1741A0786C827AF49C652AB3A7DA0533D1
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows System
-
subdirectory
SubDir
Extracted
gurcu
https://api.telegram.org/bot7029474494:AAH1z4aA2-VnubfHzTm9hl-5PQmAMfTuggo/sendMessage?chat_id=5258405739
Targets
-
-
Target
241212-wymq6ssnat_pw_infected.zip
-
Size
8KB
-
MD5
46e1dda34049ae02d12417a9ca4254a8
-
SHA1
a9f38b7196980f20c3fee1172538db73f2065284
-
SHA256
ba3b60449327330b4e55df4528ebcfb7b12cd3e51c16d8b56680314e43d72be2
-
SHA512
92f17e843d624c20ad16360ed855ff1c02895379a83bd2054374f0a6f9ee3697cdee1b4d38b3833bd2c784f45504541729c29c66275eaa7f137d6d47ab340afb
-
SSDEEP
192:bxH3A0QJWWqMk3Vp/c8hUwuz4TV3JYih6wEpby+Od7/60i2j:bxHNpfVl2bzFWDE9o/60p
-
Asyncrat family
-
Detect Vidar Stealer
-
Detect Xworm Payload
-
Gurcu family
-
Meduza Stealer payload
-
Meduza family
-
Mimikatz family
-
Quasar family
-
Quasar payload
-
RunningRat payload
-
Runningrat family
-
Snake Keylogger payload
-
Snakekeylogger family
-
Vidar family
-
XMRig Miner payload
-
Xmrig family
-
Xworm family
-
Async RAT payload
-
Looks for VirtualBox Guest Additions in registry
-
mimikatz is an open source tool to dump credentials on Windows
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Looks for VMWare Tools registry key
-
Server Software Component: Terminal Services DLL
-
A potential corporate email address has been identified in the URL: cookie-consent@1
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Creates a Windows Service
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
4Disable or Modify Tools
3Modify Registry
5Obfuscated Files or Information
1Command Obfuscation
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1OS Credential Dumping
1Security Account Manager
1Unsecured Credentials
6Credentials In Files
6Discovery
Browser Information Discovery
1Peripheral Device Discovery
3Process Discovery
1Query Registry
11Remote System Discovery
1System Information Discovery
11System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1Virtualization/Sandbox Evasion
2