General
-
Target
BitcoinFlashSenderV2.zip
-
Size
1.6MB
-
Sample
250304-1enatasjt8
-
MD5
7e228eed9bd70732361faa3c0b1111ed
-
SHA1
ec9a0fe4715830594f3f031105464569c9af0151
-
SHA256
2d454a5836f9595ec437cda94f901452f94e6c266aaaf7b7baac3f8ce2adc4cd
-
SHA512
67d963782aa7ba27bc1f502455dd05a2f49371c86f96c2ffd68fd50ca509b471a96b6597329b1a6f4572d2a23a48fc8253a0522537077f30135d7ea18f6c3fd7
-
SSDEEP
49152:KoWH+Q3uz2mzjjnWLhXB+spjkjcQOTSGY7fZ:KoWNuxzjjWNRajT7fZ
Static task
static1
Behavioral task
behavioral1
Sample
Bitcoin Flash Sender.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Bitcoin Flash Sender.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Btc_Flashing_Latest_.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Btc_Flashing_Latest_.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Main.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Main.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
quasar
2.1.0.0
Office04
45.61.140.75:7812
VNM_MUTEX_DIBuVCpZfDcrHCFft2
-
encryption_key
q8RpA86xyuUHuOrxUGXa
-
install_name
Windows Security.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Service Host
-
subdirectory
SubDir
Extracted
xworm
5.0
185.252.232.158:7812
b0c5WZixE6SqaTDD
-
Install_directory
%AppData%
-
install_file
Windows Defender Security Service.exe
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7479631857:AAFuIUMNJYKHzJ3Bc9t4FSh9ZQXlqymhFnk/sendMessage?chat_id=6291749148
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
185.252.232.158:7812
64.23.232.116:7812
vsvf
-
delay
1
-
install
true
-
install_file
Windows Security Health Service.exe
-
install_folder
%AppData%
Targets
-
-
Target
Bitcoin Flash Sender.exe
-
Size
1.0MB
-
MD5
fe4cf784ce07deb238da9cfc876b2c1f
-
SHA1
855c8c3535dff682b86ed8a17ede5f4e8bd068f8
-
SHA256
2826ba31add950b8bad6c19805f8a6cf0efc4710ac35c54acb19afc09f72c057
-
SHA512
51c225d338dc5a1e07f94dffba252a05b84d198444ed174ee0d7aeaaa27729a76b1c2389eaa03447f3f1cea02bff13cc97190bb70687bd535dd3874e989d8c81
-
SSDEEP
24576:o7uzTHUpq1n4CBQpUOgyuiSjKg5tVlHmxtC/ulI4Xf:oKT0pk4CBQrg2jgGjlb
-
Asyncrat family
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Modifies Windows Defender Real-time Protection settings
-
Quasar family
-
Quasar payload
-
StormKitty payload
-
Stormkitty family
-
Venomrat family
-
Xworm family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
-
-
Target
Btc_Flashing_Latest_.exe.deploy
-
Size
157KB
-
MD5
211fbfe924f26355d7425601e199a816
-
SHA1
63c6b67f265f38fdf7571064e2ecf3986224c625
-
SHA256
916ef31a9b62b5fca3cdf18bd4c759d9f0485e0c5a422de7126fab98f6582bbb
-
SHA512
25a8bff04a398a9b033c926d409332e796cd9737bc3d6876af71e690344354667ca7bc632f92876425289a5f929959c42340afee5e4d493478ee15fc452c982c
-
SSDEEP
768:aJf6F8jAfEYZ6F+tVi2FUm5aAfEYZ6F+t:HyEpr
Score3/10 -
-
-
Target
Main.exe
-
Size
723KB
-
MD5
da83861c41845595ac896a9ba8908166
-
SHA1
35fb04158b18389c0fa05d560b44d0c90b378bac
-
SHA256
88f0200e25ae48da6d87f5bb43c0b3ca9e3af0a55544a362a4c68fca967ab790
-
SHA512
b257db872b86fc9565222694a5bf6e74f6c825a107b3ebbc38a7e19e762b143c7ad86bce111c9eb9424d5f83fe5cb057f73456fd3c19e7f68b95acbc5fb72e90
-
SSDEEP
12288:tOhqsVIRb2yrFriBdD3aTbgLxLYjQbyGzs0yROS44MERXjI7Uh0TAXP6KH37gi:ohDsDhCU/gLijQbyGzs0yQaMKjI7kXjl
-
Asyncrat family
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Modifies Windows Defender Real-time Protection settings
-
Quasar family
-
Quasar payload
-
StormKitty payload
-
Stormkitty family
-
Venomrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Query Registry
3Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1