General
-
Target
new.bat
-
Size
33KB
-
Sample
250109-xkbmesxngs
-
MD5
878627c4bca0ba302c23e3cda27b71f6
-
SHA1
b530ab3d16cf53c9a397586c2d71e7374ad80e89
-
SHA256
f70797c423c2807efbb81828b6a179099bc12a8adf852c02128cca7c67d4172b
-
SHA512
f5e073b50b4042540e096f6ec691941b25f22f5fe3c3dd252a064a2672ac091910ef5711bd6f6c17b7af222d9f93063fc3f94be08eed57558c2f77d1917f318c
-
SSDEEP
192:b+OyBLHo3fzcQD889AANVsoVVCB0+VZ3zdYxDcis:b+WN489AU+oTCB0YZ3uxDcL
Static task
static1
Behavioral task
behavioral1
Sample
new.bat
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
new.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
fvanach.duckdns.org:7878
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
0.5.7B
Default
gvasync.duckdns.org:8797
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
5.0.5
Venom Clients
ybvenomg.duckdns.org:8890
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
xworm
3.1
hjxwrm3.duckdns.org:8895
novxwor9402.duckdns.org:9402
SftRwoP5yGpHaEZd
-
install_file
USB.exe
Extracted
xworm
5.0
gvxwrm5.duckdns.org:8896
3I9i4htBzR3bPWXw
-
Install_directory
%ProgramData%
-
install_file
Spotify.exe
Extracted
remcos
RemoteHost
rec8100nov.duckdns.org:8100
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-DSVPV7
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
new.bat
-
Size
33KB
-
MD5
878627c4bca0ba302c23e3cda27b71f6
-
SHA1
b530ab3d16cf53c9a397586c2d71e7374ad80e89
-
SHA256
f70797c423c2807efbb81828b6a179099bc12a8adf852c02128cca7c67d4172b
-
SHA512
f5e073b50b4042540e096f6ec691941b25f22f5fe3c3dd252a064a2672ac091910ef5711bd6f6c17b7af222d9f93063fc3f94be08eed57558c2f77d1917f318c
-
SSDEEP
192:b+OyBLHo3fzcQD889AANVsoVVCB0+VZ3zdYxDcis:b+WN489AU+oTCB0YZ3uxDcL
-
Asyncrat family
-
Detect Xworm Payload
-
Remcos family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Async RAT payload
-
Blocklisted process makes network request
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates processes with tasklist
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1