General
-
Target
250224-w9jtnaxqw7_pw_infected.zip
-
Size
16.9MB
-
Sample
250301-w3c3jaykt8
-
MD5
560392912801a789739dcfb266226f31
-
SHA1
503933de4c7205a07144f49560f636ea7afb5567
-
SHA256
d7676e38029789eb42452b343315be2187696c7432c3923281e961010c1c3913
-
SHA512
ca0cc8fa00c8d58dd5cd5330b33ea499dada4334c3595111d3a960ce850cf89837c0b8923418ad05d60e6a4be549a494390f553484ee229b136bb4511bf92b17
-
SSDEEP
393216:WVXqfO5xKJtoBZoqKeIwVtfxvfYst1rhdn2tCS6cFl+DJLc7xOuMO:UXqfjWoqKiVJJLrhd2cS12d2OuMO
Static task
static1
Behavioral task
behavioral1
Sample
250224-w9jtnaxqw7_pw_infected.zip
Resource
win10ltsc2021-20250217-en
Malware Config
Extracted
C:\Users\Public\Documents\RGNR_34CB127E.txt
1BKK8bsFfG3YxTd3N15GxaYfHopoThXoY4
https://tox.chat/download.html
Extracted
xworm
5.0
outside-sand.gl.at.ply.gg:31300
185.7.214.108:4411
185.7.214.54:4411
uGoUQjcjqoZsiRJZ
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
xworm
-
Install_directory
%LocalAppData%
-
install_file
Google Chrome.exe
-
pastebin_url
https://pastebin.com/raw/hhG5zGXd
Extracted
lumma
https://p3ar11fter.sbs/api
https://3xp3cts1aim.sbs/api
https://owner-vacat10n.sbs/api
https://peepburry828.sbs/api
https://p10tgrace.sbs/api
https://befall-sm0ker.sbs/api
https://librari-night.sbs/api
https://processhol.sbs/api
https://qualifiresui.cyou/api
Extracted
quasar
1.4.1
microsoft
193.161.193.99:25170
06cb3c8b-d800-42d6-af01-12c4e1f138b0
-
encryption_key
95C77D90C8A49F5740548C8A0A430C41732B639C
-
install_name
runtime.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Runtime
Extracted
quasar
1.4.1
Office04
llordiWasHere-55715.portmap.host:55715
14.243.221.170:2654
124c5996-13c0-46a2-804a-191042a109db
-
encryption_key
5F48258CBD7D9014A9443146E8A3D837D1715CAE
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
asyncrat
AsyncRAT
test
otrodia8912.gleeze.com:3333
123
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
stealc
QQtalk
http://154.216.17.90
-
url_path
/a48146f6763ef3af.php
Extracted
asyncrat
A 13
Default
163.172.125.253:333
AsyncMutex_555223
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
marsstealer
Default
kenesrakishev.net/wp-admin/admin-ajax.php
Extracted
quasar
1.4.1
SGVP
192.168.1.9:4782
150.129.206.176:4782
Ai-Sgvp-33452.portmap.host:33452
a35ec7b7-5a95-4207-8f25-7af0a7847fa5
-
encryption_key
09BBDA8FF0524296F02F8F81158F33C0AA74D487
-
install_name
User Application Data.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windowns Client Startup
-
subdirectory
Quasar
Targets
-
-
Target
250224-w9jtnaxqw7_pw_infected.zip
-
Size
16.9MB
-
MD5
560392912801a789739dcfb266226f31
-
SHA1
503933de4c7205a07144f49560f636ea7afb5567
-
SHA256
d7676e38029789eb42452b343315be2187696c7432c3923281e961010c1c3913
-
SHA512
ca0cc8fa00c8d58dd5cd5330b33ea499dada4334c3595111d3a960ce850cf89837c0b8923418ad05d60e6a4be549a494390f553484ee229b136bb4511bf92b17
-
SSDEEP
393216:WVXqfO5xKJtoBZoqKeIwVtfxvfYst1rhdn2tCS6cFl+DJLc7xOuMO:UXqfjWoqKiVJJLrhd2cS12d2OuMO
-
AmmyyAdmin payload
-
Ammyyadmin family
-
Asyncrat family
-
Detect Xworm Payload
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Flawedammyy family
-
Lumma family
-
Marsstealer family
-
Modifies WinLogon for persistence
-
Njrat family
-
Quasar family
-
Quasar payload
-
RagnarLocker
Ransomware first seen at the end of 2019, which has been used in targetted attacks against multiple companies.
-
Ragnarlocker family
-
Squirrelwaffle family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Async RAT payload
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7949) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Squirrelwaffle payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
2File Deletion
2Modify Registry
2Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Query Registry
6Remote System Discovery
1System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1