General
-
Target
new.zip
-
Size
3KB
-
Sample
250110-debkpazkas
-
MD5
474736539e4f8faa6320d9a81737828f
-
SHA1
21ed7f01ffe9ebe0bac7d020e85be075ce676ea7
-
SHA256
0325e65e9c037c4a37bf52e3092c9627a29eda51987bbcb43139e352b9d930eb
-
SHA512
3130cf0d7a7d55aa7b2ebdd1b7449996325c0e6696eacca3d88589df2db05ba4ead0c6cd7b36e8a7c0161454606c76d9e350f0fd3cf8c5137c292b85c2062362
Static task
static1
Behavioral task
behavioral1
Sample
new.bat
Resource
win7-20241010-en
Malware Config
Extracted
asyncrat
Default
fvanach.duckdns.org:7878
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
0.5.7B
Default
gvasync.duckdns.org:8797
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
5.0.5
Venom Clients
ybvenomg.duckdns.org:8890
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
xworm
3.1
hjxwrm3.duckdns.org:8895
novxwor9402.duckdns.org:9402
SftRwoP5yGpHaEZd
-
install_file
USB.exe
Extracted
xworm
5.0
gvxwrm5.duckdns.org:8896
3I9i4htBzR3bPWXw
-
Install_directory
%ProgramData%
-
install_file
Spotify.exe
Targets
-
-
Target
new.bat
-
Size
33KB
-
MD5
878627c4bca0ba302c23e3cda27b71f6
-
SHA1
b530ab3d16cf53c9a397586c2d71e7374ad80e89
-
SHA256
f70797c423c2807efbb81828b6a179099bc12a8adf852c02128cca7c67d4172b
-
SHA512
f5e073b50b4042540e096f6ec691941b25f22f5fe3c3dd252a064a2672ac091910ef5711bd6f6c17b7af222d9f93063fc3f94be08eed57558c2f77d1917f318c
-
SSDEEP
192:b+OyBLHo3fzcQD889AANVsoVVCB0+VZ3zdYxDcis:b+WN489AU+oTCB0YZ3uxDcL
-
Asyncrat family
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-