Overview
overview
10Static
static
10aquatic_cracked.zip
windows7-x64
1aquatic_cracked.zip
windows10-2004-x64
8config.toml
windows7-x64
3config.toml
windows10-2004-x64
8crack.dll
windows7-x64
9crack.dll
windows10-2004-x64
9loader.exe
windows7-x64
10loader.exe
windows10-2004-x64
10main.exe
windows7-x64
7main.exe
windows10-2004-x64
8General
-
Target
aquatic_cracked.zip
-
Size
40.6MB
-
Sample
250217-dtnhssyjcv
-
MD5
6296ae99120a74f4582965def5298133
-
SHA1
074e8be2bd7bced0476ed796568a5d007be254de
-
SHA256
0dc223deeb245f7ef48f298ea3f6630b8ab0c555b988dd0f901b2dec624ee2a0
-
SHA512
a21c9a80de6b2308efd56febc5277017256dd4d4f7cc97fe4851dbd7e421339ac14805ec986f2058924b76765a799cbb131c62c787f44f48bbb5552310005ec2
-
SSDEEP
786432:kuDuTF+Vxw89urUY8y1i3fNIqyEROml3sWcpVCwFSTtG4+nyVvUzueMEG:kL+Vl9q8y1saqyE448CCSJoyVvUueMEG
Behavioral task
behavioral1
Sample
aquatic_cracked.zip
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
aquatic_cracked.zip
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
config.toml
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
config.toml
Resource
win10v2004-20250211-en
Behavioral task
behavioral5
Sample
crack.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
crack.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral7
Sample
loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
loader.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral9
Sample
main.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
main.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
aquatic_cracked.zip
-
Size
40.6MB
-
MD5
6296ae99120a74f4582965def5298133
-
SHA1
074e8be2bd7bced0476ed796568a5d007be254de
-
SHA256
0dc223deeb245f7ef48f298ea3f6630b8ab0c555b988dd0f901b2dec624ee2a0
-
SHA512
a21c9a80de6b2308efd56febc5277017256dd4d4f7cc97fe4851dbd7e421339ac14805ec986f2058924b76765a799cbb131c62c787f44f48bbb5552310005ec2
-
SSDEEP
786432:kuDuTF+Vxw89urUY8y1i3fNIqyEROml3sWcpVCwFSTtG4+nyVvUzueMEG:kL+Vl9q8y1saqyE448CCSJoyVvUueMEG
Score8/10-
Downloads MZ/PE file
-
-
-
Target
config.toml
-
Size
202B
-
MD5
fe783a62cf5f5e09a7d8c6fd17ae60df
-
SHA1
46fa99c2b4c4158e9d9542559f11f34df5da8840
-
SHA256
3188d09b74d87c1f1d1b6cd2624ef6fbb02aa27183e4908bed30f7f8ecd371b5
-
SHA512
d20a4d9c2a6f6ee2a7f4bc7d86264d1028d17db6e6cd868a27ff6d191170104bd99641dbba636d05588ad5e031ba378dcb28420b8a38363fcfadbb2608d25de3
Score8/10-
Downloads MZ/PE file
-
-
-
Target
crack.dll
-
Size
5.1MB
-
MD5
fe7dc4218e47f5c31e7a2db9b2e55ddd
-
SHA1
6d30688097e87755b5d59429e5dfb9ce0562f931
-
SHA256
1cbaa9f954edae2e9a6ccac8e0119ff533ee01b42b1bb24fa10adfa80064b780
-
SHA512
922048e800411cb7f21618647b88b0d8b5c98aa45a55eb8ab66a838f3900bed6e03cd247e27af0b304bd4b71fa6402d1b88aa320aa4c23a42088a1617dac73c7
-
SSDEEP
98304:ZvNYCYPKFV3CIz5igBo6qO90Pqp8YVH/6yG/fdmjLdGGf:ZvyWLNia90S7iyb
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks whether UAC is enabled
-
-
-
Target
loader.exe
-
Size
13.2MB
-
MD5
5ff10152530307b7903a5273dcdcd506
-
SHA1
e140280b3524bcbc47db71eb5dcaeb0c5a58ce4a
-
SHA256
654e0a21bb10acdb2726cff23859d207e408bec19c198a6a1fd46a74db266410
-
SHA512
d26bf9bb14ccb2d292c432179678aaa77f7ff7ab07eae292b70fdacd4bfd18c2c1aa60e2c58dd4b94b4c8da1bd619a50554834131e20fd3cac04f5ced8dd7010
-
SSDEEP
393216:LwFSeUNkxhQSj/utI2v49J3lHVs4DGGLaeqOv:PeikL1Wq2v4RHV5Xu4
-
Asyncrat family
-
Modifies security service
-
StormKitty payload
-
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xred family
-
Async RAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
-
-
Target
main.exe
-
Size
24.1MB
-
MD5
c4639a9dd4fa418a1e2e5537b9a53bfe
-
SHA1
9fea0f4615170667aa59dac92f6d424455b5fc54
-
SHA256
6548853e51522d28bc2d4ee6dbecdfe7be496462cb87f26587f830374ce07ec7
-
SHA512
2e5f53a2d4bae0028ecb715485327db9da7aeb45176e7e54db039516dab6002f41b5f44ae728f7752ee840f34b14ac78698cea3bc4cc2d00ea815873bad6b692
-
SSDEEP
786432:8Ljr7FsBzlI0ecXYc1xk/cBFG8zv7NRDZPA:oezlI1kLxJBFGu7HFY
Score8/10-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Obfuscated Files or Information
1Command Obfuscation
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Process Discovery
1Query Registry
7System Information Discovery
9System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1Virtualization/Sandbox Evasion
1