General
-
Target
Dropper.exe
-
Size
18.0MB
-
Sample
250307-1dwwkaykt4
-
MD5
392b044ac8ee5751045a163b2d1a358f
-
SHA1
56429e69619c0e69128732051db6e0e9bc40c18c
-
SHA256
1001e70668789e08f7979484610e5246fa3c760142bc3ca8a55ce3da2301907a
-
SHA512
2d0fd9963373132fde1d442d742efc95e8510f61325518aead420eeffb70e2a7566d95d3015ad930c4beddd2aa3d5b937b5711d0b0d09ee795eb6136aa26409b
-
SSDEEP
393216:m9YidhKRmmb1TfHqO1UyXMCHWUjlVg74wdugWIPPVBFVVJo8W:m9Yidh0MyXMb8PDwduGPPVNV+8W
Behavioral task
behavioral1
Sample
Dropper.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Dropper.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
asyncrat
0.5.8
Default
192.168.1.222:6606
192.168.1.222:7707
192.168.1.222:8808
mA2752pAY1JK
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
xworm
192.168.1.222:7000
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
Dropper.exe
-
Size
18.0MB
-
MD5
392b044ac8ee5751045a163b2d1a358f
-
SHA1
56429e69619c0e69128732051db6e0e9bc40c18c
-
SHA256
1001e70668789e08f7979484610e5246fa3c760142bc3ca8a55ce3da2301907a
-
SHA512
2d0fd9963373132fde1d442d742efc95e8510f61325518aead420eeffb70e2a7566d95d3015ad930c4beddd2aa3d5b937b5711d0b0d09ee795eb6136aa26409b
-
SSDEEP
393216:m9YidhKRmmb1TfHqO1UyXMCHWUjlVg74wdugWIPPVBFVVJo8W:m9Yidh0MyXMb8PDwduGPPVNV+8W
-
Asyncrat family
-
Detect Xworm Payload
-
Xworm family
-
Async RAT payload
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1