Overview
overview
10Static
static
10Dangerous ...AT.exe
windows7-x64
10Dangerous ...AT.exe
windows10-2004-x64
10Dangerous ...nd.exe
windows7-x64
3Dangerous ...nd.exe
windows10-2004-x64
3Dangerous ...ox.dll
windows7-x64
1Dangerous ...ox.dll
windows10-2004-x64
1Dangerous ...og.rtf
windows7-x64
4Dangerous ...og.rtf
windows10-2004-x64
1Dangerous ...nd.exe
windows7-x64
3Dangerous ...nd.exe
windows10-2004-x64
3Dangerous ...ub.exe
windows7-x64
6Dangerous ...ub.exe
windows10-2004-x64
7Dangerous ...ub.exe
windows7-x64
3Dangerous ...ub.exe
windows10-2004-x64
3Dangerous ...ub.vbs
windows7-x64
1Dangerous ...ub.vbs
windows10-2004-x64
1Dangerous ...il.dll
windows7-x64
1Dangerous ...il.dll
windows10-2004-x64
1Dangerous ...io.dll
windows7-x64
1Dangerous ...io.dll
windows10-2004-x64
1Dangerous ...AN.exe
windows7-x64
1Dangerous ...AN.exe
windows10-2004-x64
1Dangerous ...df.exe
windows7-x64
3Dangerous ...df.exe
windows10-2004-x64
3Dangerous ...nt.dll
windows7-x64
3Dangerous ...nt.dll
windows10-2004-x64
3Dangerous ...nx.dll
windows7-x64
3Dangerous ...nx.dll
windows10-2004-x64
3Dangerous ...li.dll
windows7-x64
3Dangerous ...li.dll
windows10-2004-x64
3Dangerous ...Dc.dll
windows7-x64
1Dangerous ...Dc.dll
windows10-2004-x64
1Analysis
-
max time kernel
127s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2025, 15:30
Behavioral task
behavioral1
Sample
Dangerous RAT/Dangerous RAT.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Dangerous RAT/Dangerous RAT.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Dangerous RAT/Extensions/Bind.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Dangerous RAT/Extensions/Bind.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Dangerous RAT/FastColoredTextBox.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Dangerous RAT/FastColoredTextBox.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Dangerous RAT/Kalogar_Online/Dell-12-30-2020/Keylog.rtf
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Dangerous RAT/Kalogar_Online/Dell-12-30-2020/Keylog.rtf
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
Dangerous RAT/Kay/Bind.exe
Resource
win7-20250207-en
Behavioral task
behavioral10
Sample
Dangerous RAT/Kay/Bind.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
Dangerous RAT/Kay/Stub.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Dangerous RAT/Kay/Stub.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
Dangerous RAT/Kay/Stub.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Dangerous RAT/Kay/Stub.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
Dangerous RAT/Kay/Stub.vbs
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
Dangerous RAT/Kay/Stub.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
Dangerous RAT/Mono.Cecil.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Dangerous RAT/Mono.Cecil.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
Dangerous RAT/NAudio.dll
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
Dangerous RAT/NAudio.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
Dangerous RAT/Plugin/AN.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
Dangerous RAT/Plugin/AN.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
Dangerous RAT/Plugin/Adf.exe
Resource
win7-20250207-en
Behavioral task
behavioral24
Sample
Dangerous RAT/Plugin/Adf.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
Dangerous RAT/Plugin/Ant.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Dangerous RAT/Plugin/Ant.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
Dangerous RAT/Plugin/Anx.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Dangerous RAT/Plugin/Anx.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
Dangerous RAT/Plugin/Cli.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Dangerous RAT/Plugin/Cli.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
Dangerous RAT/Plugin/Dc.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Dangerous RAT/Plugin/Dc.dll
Resource
win10v2004-20250217-en
General
-
Target
Dangerous RAT/Dangerous RAT.exe
-
Size
7.2MB
-
MD5
302cb7218c3275c139ac070dae4f4daa
-
SHA1
bcf24a42ae53f36863caa8b9c49a67d6a2bbc223
-
SHA256
0079ba87b80bba1dbeb2fb1ea7361f7a44d0c4e9d55995c28b3329e9265a8c14
-
SHA512
118819ac3011e0cb6222e883c95d179a970b8166dccdff7ed3bdeb34d1f67a5eee1ef2b251d708fd67b07835eb67cdbfcf877bb722f35a4dd086e38bf98c8adb
-
SSDEEP
196608:/btBPRnfvon6IZYhydLLCdsflb8MKHTdas:7ZQ60LyS8MSas
Malware Config
Extracted
xworm
3.0
3skr.uncofig.com:9999
wRjQMjeNtaZnUCMU
-
Install_directory
%AppData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7942324376:AAFz5Z-GdKIj1CePZyqIUmvNWOymMRw8Lmk/sendMessage?chat_id=2078478344
Signatures
-
Detect Neshta payload 2 IoCs
resource yara_rule behavioral2/files/0x000d000000023b96-21.dat family_neshta behavioral2/memory/2504-32-0x0000000000130000-0x0000000000C6E000-memory.dmp family_neshta -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000d000000023b94-7.dat family_xworm behavioral2/memory/2624-16-0x00000000003B0000-0x00000000003C0000-memory.dmp family_xworm -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation Dangerous RAT.exe -
Executes dropped EXE 2 IoCs
pid Process 2624 set.exe 2504 Dangerous RAT 2020 Cracked by Unknown Venom.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dangerous RAT 2020 Cracked by Unknown Venom.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2624 set.exe Token: SeDebugPrivilege 2504 Dangerous RAT 2020 Cracked by Unknown Venom.exe Token: 33 2660 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2660 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2504 Dangerous RAT 2020 Cracked by Unknown Venom.exe 2504 Dangerous RAT 2020 Cracked by Unknown Venom.exe 2504 Dangerous RAT 2020 Cracked by Unknown Venom.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2504 Dangerous RAT 2020 Cracked by Unknown Venom.exe 2504 Dangerous RAT 2020 Cracked by Unknown Venom.exe 2504 Dangerous RAT 2020 Cracked by Unknown Venom.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2624 2896 Dangerous RAT.exe 90 PID 2896 wrote to memory of 2624 2896 Dangerous RAT.exe 90 PID 2896 wrote to memory of 2504 2896 Dangerous RAT.exe 91 PID 2896 wrote to memory of 2504 2896 Dangerous RAT.exe 91 PID 2896 wrote to memory of 2504 2896 Dangerous RAT.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dangerous RAT\Dangerous RAT.exe"C:\Users\Admin\AppData\Local\Temp\Dangerous RAT\Dangerous RAT.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\Dangerous RAT\set.exe"C:\Users\Admin\AppData\Local\Temp\Dangerous RAT\set.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\Dangerous RAT\Dangerous RAT 2020 Cracked by Unknown Venom.exe"C:\Users\Admin\AppData\Local\Temp\Dangerous RAT\Dangerous RAT 2020 Cracked by Unknown Venom.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2504
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x420 0x4601⤵
- Suspicious use of AdjustPrivilegeToken
PID:2660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.2MB
MD5fb40ba1b494af4057ab259bba5f33fe6
SHA1b872393a07d3949947a41871132b736c00c771bb
SHA25640a82c50b9875698551a2f6dd4f71fc23b4a04eeec655a4746111279ef57d2ac
SHA512f2feec8be6578aa273efd363ae1eba0862fc240a441fd8d1f14942fda241e34896e7b76179d7132af97f18acdf13afd4032f1874a9b20cc04120706beff9e804
-
Filesize
38KB
MD5e1929d0781ff08abf8be3051479043b6
SHA10605a5657e022bd1cadf80f13446c678728dcde9
SHA256b4ae6a462c5f24bec5870f6e92d94a00b1e1a4abd95e5433d6ac99a0f9d92042
SHA512fb47c341b636293d500f1892f02e2be2b16bd0301eedc0c30025c00ae22ce3fe6d42abc0a4837cc5551eeed6cd5bbe815a0301db86bac6a84177a6c103d54d27