Resubmissions
03/03/2025, 22:52 UTC
250303-2ttxksssfx 1003/03/2025, 22:39 UTC
250303-2k977s1r17 1003/03/2025, 22:13 UTC
250303-1496wa1mz6 1003/03/2025, 22:08 UTC
250303-12lqha1lz8 1002/03/2025, 00:28 UTC
250302-astfwaxxft 1026/02/2025, 16:01 UTC
250226-tglrfavp16 1026/02/2025, 16:01 UTC
250226-tf7mhsvvcz 3General
-
Target
Ultra Mega Null DDoS Panel (added API Function in v2.39).exe
-
Size
22.4MB
-
Sample
250226-tglrfavp16
-
MD5
317c5fe16b5314d1921930e300d9ea39
-
SHA1
65eb02c735bbbf1faf212662539fbf88a00a271f
-
SHA256
d850d741582546a3d0ea2ad5d25e0766781f315cd37e6c58f7262df571cd0c40
-
SHA512
31751379ad7f6c55d87e9a5c1f56e6211d515b7d9ae055af962ed6f9205f5abad302c2e47dd56325abff85327ec3b7f9a6cf76ed34b8cbe1da06549c622c7031
-
SSDEEP
49152:yIT4lj7Rl9HFoDi+3JK5CS2bV5IRtyrp63FDysl28Wvp/pUOmrscrdXuMIgqJ95+:yI6
Static task
static1
Behavioral task
behavioral1
Sample
Ultra Mega Null DDoS Panel (added API Function in v2.39).exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
Ultra Mega Null DDoS Panel (added API Function in v2.39).exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral3
Sample
Ultra Mega Null DDoS Panel (added API Function in v2.39).exe
Resource
win11-20250217-en
Malware Config
Extracted
C:\Users\Public\Documents\RGNR_6D6FC352.txt
cargowelcome@protonmail.com
1BKK8bsFfG3YxTd3N15GxaYfHopoThXoY4
https://tox.chat/download.html
Extracted
quasar
1.4.1
Office04
193.161.193.99:43242
havocc.ddns.net:4782
45bfb701-bea2-411a-948d-9a6abe001f83
-
encryption_key
80594967BC0A4839C316A44D62DE36E9BF18177F
-
install_name
SYSTEM26.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
xworm
5.0
outside-sand.gl.at.ply.gg:31300
VQd9MfbX4V71RInT
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
metasploit
windows/reverse_tcp
147.185.221.19:58142
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
SolaraFake
anyone-blogging.gl.at.ply.gg:22284
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Windows.exe
-
install_folder
%Temp%
Extracted
marsstealer
Default
Targets
-
-
Target
Ultra Mega Null DDoS Panel (added API Function in v2.39).exe
-
Size
22.4MB
-
MD5
317c5fe16b5314d1921930e300d9ea39
-
SHA1
65eb02c735bbbf1faf212662539fbf88a00a271f
-
SHA256
d850d741582546a3d0ea2ad5d25e0766781f315cd37e6c58f7262df571cd0c40
-
SHA512
31751379ad7f6c55d87e9a5c1f56e6211d515b7d9ae055af962ed6f9205f5abad302c2e47dd56325abff85327ec3b7f9a6cf76ed34b8cbe1da06549c622c7031
-
SSDEEP
49152:yIT4lj7Rl9HFoDi+3JK5CS2bV5IRtyrp63FDysl28Wvp/pUOmrscrdXuMIgqJ95+:yI6
-
Asyncrat family
-
Detect Xworm Payload
-
Marsstealer family
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Quasar family
-
Quasar payload
-
RagnarLocker
Ransomware first seen at the end of 2019, which has been used in targetted attacks against multiple companies.
-
Ragnarlocker family
-
Squirrelwaffle family
-
Xworm family
-
Async RAT payload
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (5723) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Squirrelwaffle payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1Pre-OS Boot
1Bootkit
1