Resubmissions

21-02-2025 21:27

250221-1a286szqgy 10

General

  • Target

    Output.exe

  • Size

    101.5MB

  • Sample

    250221-1a286szqgy

  • MD5

    99dedecce8d12d114093774bfe37e8d2

  • SHA1

    3c426086ac435fc2f0f8d484ec0c8ac3b7b67198

  • SHA256

    19160558464eae235ddcabd9ca2f2430fe9cd4ef09a4a48422b3d307dc9f1211

  • SHA512

    0ae07c890b8759a549dcaa0095ffd7bb77207e421671b7c43ca55766d912afc605cce6d0beab854b7de43535a572d49d657f257a735d4517d1481019a077733b

  • SSDEEP

    1572864:TAH9VHuvHriHHGVZVPbRe57nkuAwa1Fn7bzsj7e4ZleTIVYX+rpox53/7ZTOMdZk:iLuvkUs6vx7b0Lowc3lTOMMoDK7ubWQ

Malware Config

Extracted

Family

xworm

Version

5.0

C2

77.100.63.251:5631

Mutex

hBzn8DEgaZjEQy9i

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    XClient.exe

aes.plain

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

77.100.63.251:5631

Mutex

wPgAGvV1528Y

Attributes
  • delay

    3

  • install

    true

  • install_file

    G.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMzNTM2MTY5MTk5OTAxMDgxNg.GciI8P.eK2Ct0JduBeUphJEDtbS4269H32Q5D3CBEUg6o

  • server_id

    1342556667375779910

Targets

    • Target

      Output.exe

    • Size

      101.5MB

    • MD5

      99dedecce8d12d114093774bfe37e8d2

    • SHA1

      3c426086ac435fc2f0f8d484ec0c8ac3b7b67198

    • SHA256

      19160558464eae235ddcabd9ca2f2430fe9cd4ef09a4a48422b3d307dc9f1211

    • SHA512

      0ae07c890b8759a549dcaa0095ffd7bb77207e421671b7c43ca55766d912afc605cce6d0beab854b7de43535a572d49d657f257a735d4517d1481019a077733b

    • SSDEEP

      1572864:TAH9VHuvHriHHGVZVPbRe57nkuAwa1Fn7bzsj7e4ZleTIVYX+rpox53/7ZTOMdZk:iLuvkUs6vx7b0Lowc3lTOMMoDK7ubWQ

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Detect Xworm Payload

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Discordrat family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Async RAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks