General
-
Target
test.exe
-
Size
14.3MB
-
Sample
250204-w448eaxrap
-
MD5
8a44ee98217bc81f0869d793eefab1f0
-
SHA1
4756ed10cbf5dbad09746a8fa2c2e62c2f2b7200
-
SHA256
c26e2475ef60ba969bb66c9b464b498efb1da0bf7360ff7545c1db3b707bdbed
-
SHA512
4f18f54d791929cb24c02e8865d520e6263c096bef7ebd422578bca0600cadb6ea4b046654ef007ba056bf568ff3a19b068bf4313b4a218953a5bd2ecb0e6a02
-
SSDEEP
393216:vOWd863huc1dQJlAwF3MnG3InVFedWm7NS/xHWgnHz:2893hr1dQ53MG4VAHsT
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
test.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
xworm
5.0
185.208.156.62:9009
Iuf47JITa74lSJjB
-
install_file
USB.exe
Extracted
asyncrat
AsyncRAT
test
otrodia8912.gleeze.com:3333
123
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
vidar
https://t.me/sok33tn
https://steamcommunity.com/profiles/76561199824159981
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Extracted
rhadamanthys
https://185.196.11.237:9697/f002171ab05c7/9xqdctgg.ir1fr
Extracted
quasar
1.3.0.0
sigorta
213.238.177.46:1604
QSR_MUTEX_dxT1m3RtSBLlUoRqXL
-
encryption_key
AZfjKXCnqT1oHdxEyyKo
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
quasar
1.4.1
Sigorta
0.0.0.0:7777
13.48.129.198:7777
172.31.0.240:7777
3b0592fc-14a1-4b8e-9803-69284ea2b6d2
-
encryption_key
E0BB4B221F7AADA73B9059B33A3CFF096A518413
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
orcus
FIVEM
198.50.242.157:3846
7c8e6bec5a514abfa98e8c7d116e215a
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\GoogleChromeUpt\Updater.exe
-
reconnect_delay
10000
-
registry_keyname
ChromeStarter
-
taskscheduler_taskname
Start
-
watchdog_path
AppData\ChromeDEV.exe
Targets
-
-
Target
test.exe
-
Size
14.3MB
-
MD5
8a44ee98217bc81f0869d793eefab1f0
-
SHA1
4756ed10cbf5dbad09746a8fa2c2e62c2f2b7200
-
SHA256
c26e2475ef60ba969bb66c9b464b498efb1da0bf7360ff7545c1db3b707bdbed
-
SHA512
4f18f54d791929cb24c02e8865d520e6263c096bef7ebd422578bca0600cadb6ea4b046654ef007ba056bf568ff3a19b068bf4313b4a218953a5bd2ecb0e6a02
-
SSDEEP
393216:vOWd863huc1dQJlAwF3MnG3InVFedWm7NS/xHWgnHz:2893hr1dQ53MG4VAHsT
-
AmmyyAdmin payload
-
Ammyyadmin family
-
Asyncrat family
-
Detect Vidar Stealer
-
Detect Xworm Payload
-
Orcus family
-
Orcus main payload
-
Quasar family
-
Quasar payload
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Vidar family
-
Xworm family
-
Async RAT payload
-
Orcurs Rat Executable
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
3PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1