Overview
overview
10Static
static
10c39e5e5773...fb.exe
windows7-x64
7c39e5e5773...fb.exe
windows10-2004-x64
7c3a61d282c...2f.exe
windows7-x64
7c3a61d282c...2f.exe
windows10-2004-x64
7c3aaa8d067...d1.exe
windows7-x64
10c3aaa8d067...d1.exe
windows10-2004-x64
10c40612db16...6d.exe
windows7-x64
10c40612db16...6d.exe
windows10-2004-x64
10c45000d072...99.exe
windows7-x64
10c45000d072...99.exe
windows10-2004-x64
10c4639b8ab9...97.exe
windows7-x64
10c4639b8ab9...97.exe
windows10-2004-x64
10c47cd91636...6d.exe
windows7-x64
1c47cd91636...6d.exe
windows10-2004-x64
1c486ed6acb...df.exe
windows7-x64
7c486ed6acb...df.exe
windows10-2004-x64
7c4b4c8152f...dc.exe
windows7-x64
10c4b4c8152f...dc.exe
windows10-2004-x64
10c4c197e502...e0.exe
windows7-x64
10c4c197e502...e0.exe
windows10-2004-x64
10c4ca622404...18.exe
windows7-x64
10c4ca622404...18.exe
windows10-2004-x64
10c50b533887...50.exe
windows7-x64
10c50b533887...50.exe
windows10-2004-x64
10c50b94cf52...6f.exe
windows7-x64
10c50b94cf52...6f.exe
windows10-2004-x64
10c520bfebf2...a2.exe
windows7-x64
8c520bfebf2...a2.exe
windows10-2004-x64
10c53059381a...48.exe
windows7-x64
10c53059381a...48.exe
windows10-2004-x64
10c59549cfc2...b8.exe
windows7-x64
1c59549cfc2...b8.exe
windows10-2004-x64
1General
-
Target
7ddbec7fac00ec5624f45da5879ebfa97d95b21c7842cbaa1058daa46a47bd41
-
Size
53.0MB
-
Sample
250322-ylqcmstky9
-
MD5
c692fa0dfc4fcfaa5dce4ea98d212465
-
SHA1
eb86bac588f58eeeb4475f0e5703f7dafdd9c1f4
-
SHA256
7ddbec7fac00ec5624f45da5879ebfa97d95b21c7842cbaa1058daa46a47bd41
-
SHA512
2d93dc2a53994027f20ffbb23cb6cf0144968d0457bc194f347814bda93077b4f4258dd4fa2ba140b3ea8b225724dbafcd1d24027baf42d1a3f81d3c4033981e
-
SSDEEP
786432:4p8UWG0mnu0Pkk6tCWsjaOAUa//yxNJGXO+1fey4wyrvfOyQ37Mhd6uPsiOyQ37W:4j1u0Pkk6tCbjoUyaYNeQohlPfQcd
Static task
static1
Behavioral task
behavioral1
Sample
c39e5e577360a09a924844399e1953fb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c39e5e577360a09a924844399e1953fb.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
c3a61d282c9a5249427d1c50d79414b05441de100982cf90354b0466ec013e2f.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
c3a61d282c9a5249427d1c50d79414b05441de100982cf90354b0466ec013e2f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
c3aaa8d0678c59cfe55a289d29c5b3d1.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
c3aaa8d0678c59cfe55a289d29c5b3d1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
c40612db16415a3ee8c44a6f5157ef0e20ae02daa0d2c9c0cb99eac72887466d.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
c40612db16415a3ee8c44a6f5157ef0e20ae02daa0d2c9c0cb99eac72887466d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
c45000d07293154a655ba52ffb7bab99.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
c45000d07293154a655ba52ffb7bab99.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
c4639b8ab98b523a89ed2bda24ad0398b38514d4a5737e6450912caaca523297.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
c4639b8ab98b523a89ed2bda24ad0398b38514d4a5737e6450912caaca523297.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
c47cd916369fb96f0624e8c8a549946d.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
c47cd916369fb96f0624e8c8a549946d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
c486ed6acb598d864bd441b40bbb31df.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
c486ed6acb598d864bd441b40bbb31df.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
c4b4c8152f8279bd2440201d33beb75aa3078ebc76c0622bb4778375afb08adc.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
c4b4c8152f8279bd2440201d33beb75aa3078ebc76c0622bb4778375afb08adc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
c4c197e50214b25100e10fb00b2ac6e0.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
c4c197e50214b25100e10fb00b2ac6e0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
c4ca622404b5b4763e20a205a41db518.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
c4ca622404b5b4763e20a205a41db518.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
c50b533887d2992f66c414bd95339750.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
c50b533887d2992f66c414bd95339750.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
c520bfebf2b7ca231d0b6bb731bc67c608dad8f84583daab3f8d0783fa3ae7a2.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
c520bfebf2b7ca231d0b6bb731bc67c608dad8f84583daab3f8d0783fa3ae7a2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
c53059381a17db7f48cf6871b7869c48.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
c53059381a17db7f48cf6871b7869c48.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
c59549cfc2b2687a8a799ef4b5c772e60d089fff5ccd837b46f07b019eb359b8.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
c59549cfc2b2687a8a799ef4b5c772e60d089fff5ccd837b46f07b019eb359b8.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
revengerat
Guest
127.0.0.1:333
RV_MUTEX
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
192.168.100.15:1120
127.0.0.1:1120
201.14.241.58:1120
zlayyfeneka
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
xworm
127.0.0.1:62271
renzik-62271.portmap.host:62271
127.0.0.1:47701
xyxviebet-47701.portmap.hos:47701
-
Install_directory
%Temp%
-
install_file
svchost.exe
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
game(1)
saint8951.ddns.net:6522
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Extracted
njrat
0.7d
HacKed
127.0.0.1:5552
279f6960ed84a752570aca7fb2dc1552
-
reg_key
279f6960ed84a752570aca7fb2dc1552
-
splitter
|'|'|
Extracted
njrat
0.6.4
HacKed
basmtrke00.ddns.net:1177
c5cc28849e1bf231257e550415541cf5
-
reg_key
c5cc28849e1bf231257e550415541cf5
-
splitter
|'|'|
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Extracted
asyncrat
Default
127.0.0.1:14888
health-eddie.gl.at.ply.gg:14888
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
0.4.9G
corporation.warzonedns.com:9341
480-28105c055659
-
delay
0
-
install
false
-
install_folder
%AppData%
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Targets
-
-
Target
c39e5e577360a09a924844399e1953fb.exe
-
Size
17.7MB
-
MD5
c39e5e577360a09a924844399e1953fb
-
SHA1
cfcede39f7afad0df9473c8cd9d328db72dbd90b
-
SHA256
e8955e77203db68470ff9461e2faf9deed3df0c3fab1b0fd5d4c8a6595f5c72c
-
SHA512
78b865dbbefafce9a9948a14e2013c3650d028d87e3ed4b2a5d4281687c826b3cd8044274c0e54853f6b48533ac07af3065c6ad34b629c22587f26ad5aee35c7
-
SSDEEP
393216:8YGbY6iHonlQCe88BYdY3SHFPJXFODKSblmY+:87Y2CCe4dAmFOmSJm9
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
c3a61d282c9a5249427d1c50d79414b05441de100982cf90354b0466ec013e2f.exe
-
Size
7.9MB
-
MD5
f9ccfba03895eb7877510ace1bf59a71
-
SHA1
87a165c002005a72324064922faf48c55ed809b6
-
SHA256
c3a61d282c9a5249427d1c50d79414b05441de100982cf90354b0466ec013e2f
-
SHA512
b61f17eb86b5d79e228100228f785703cc1582867b5be13b0ceda0bbe4329e2ccb31981365d0edd428e34c9db5f40bc5bc9faa54c52043f5c0983ae288ae8e47
-
SSDEEP
196608:c9sGLbd7rEWWn87E3QeotSqrG8YqcIXcZZBy:cmqbhrEbn87eZsFmq+m
Score7/10-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
c3aaa8d0678c59cfe55a289d29c5b3d1.exe
-
Size
5.9MB
-
MD5
c3aaa8d0678c59cfe55a289d29c5b3d1
-
SHA1
2c592322b164e7fa9282bfdb7a650dbe4d41492c
-
SHA256
c18fdffa9d1b4bc8ae2f14f8685b9dcad5d250760d0fe059c522115dac9a3d24
-
SHA512
e36f85f15ee3e026fcac40603e8985277f1196d2435cb95c24ffa9afc1dbd09c69474be0d601c7b6a6c67bec203369cfb1e67aa6db1ae1a0056910b12bd70408
-
SSDEEP
98304:ByeUxPQ0JMLyWIvqrhH05I8TderKjHDFUh9HkEXJfw4G:ByeU11Rvqmu8TWKnF6N/1w3
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
c40612db16415a3ee8c44a6f5157ef0e20ae02daa0d2c9c0cb99eac72887466d.exe
-
Size
2.0MB
-
MD5
30418a412a039e750e959867f732afd3
-
SHA1
01ea877908ecfcf2d6bede5ff1137f878f862ecd
-
SHA256
c40612db16415a3ee8c44a6f5157ef0e20ae02daa0d2c9c0cb99eac72887466d
-
SHA512
9f861fb3b163009f65c4d576ac89b31c502b46bda9acb0110756a4bbf46a55e61f4b2e1481c603827e3f4fa12f19de7979fd7a76e1fd0feb3bb956c7706f5c59
-
SSDEEP
49152:7rYU+Yy4J8jao9UVlWAOjhRzsiYHjo++xTN:7dxVJC9UqRzsu+8N
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
-
-
Target
c45000d07293154a655ba52ffb7bab99.exe
-
Size
849KB
-
MD5
c45000d07293154a655ba52ffb7bab99
-
SHA1
4b4fbc2c00cf6c6c6fcea58074213c4f0606b80a
-
SHA256
f639fc426671cba387b08b8c14743bccfd9d13866982573a1ed2e150967c17ac
-
SHA512
2805351e0080a62061efb9bc7e3d953221df1180edfcf1142b59302a0afbcf3332a8855deaa9f147ebb11789a3cdbadf6073306000d03698537813bf579df674
-
SSDEEP
12288:I6NE5ig5Fttrh5PxjUm5SvDdLILaBFkjKuAMx6A5gtbGk84Ca04jtiPBgGKYTx:I6N297PxbsKtC5AHgk
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
-
-
Target
c4639b8ab98b523a89ed2bda24ad0398b38514d4a5737e6450912caaca523297.exe
-
Size
115KB
-
MD5
4bfc91ad73afd3925f3116fd870c6e65
-
SHA1
6715e01e71153f24cece377d6be80ed513e0acc2
-
SHA256
c4639b8ab98b523a89ed2bda24ad0398b38514d4a5737e6450912caaca523297
-
SHA512
daf2d857a96a5f71f670a0c352b365268df4a4a723a07f9d38c466265239eb30589afd8eed7971d1e8781a129c8c962c316014d4c07e1857352d2a217ad2e240
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDI3:P5eznsjsguGDFqGZ2rDI3
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
c47cd916369fb96f0624e8c8a549946d.exe
-
Size
16KB
-
MD5
c47cd916369fb96f0624e8c8a549946d
-
SHA1
f7a18e9e87292c32dd956a23c223c1b19fd4aeb7
-
SHA256
9ae1914f28457c593679089eb29415f8a80ab46730a1e4e5f9dfdbe7d22860b9
-
SHA512
51df1ea3d544561789629901626ac1a2843181572f941dc827f29409bc113e483e42784e1acce45329f63423367f392cfb33d348953008119673a8482f541a2a
-
SSDEEP
384:6/5gk7lVzF3stf9oDPlMNcLlb5sVKhye5Ct:6/5gk7lVZUclMNEdo
Score1/10 -
-
-
Target
c486ed6acb598d864bd441b40bbb31df.exe
-
Size
6.8MB
-
MD5
c486ed6acb598d864bd441b40bbb31df
-
SHA1
4842165e42d247982c8dadbbe316ec8f1dcb1174
-
SHA256
6d0f06ad75a8a2959de87e4c142faa335f593d5af278f0617c1acc886c4a946a
-
SHA512
9fb7e9a285c6ca9b769dc9ed5eedd60e710064c59c32e6d7cd89b37e05ef4d782440bf4fd32729c6a4f090ff1c61e7017bd4578c1d32c4545e0b9e42054c0029
-
SSDEEP
12288:nsssDsssssssssssssssssssssssssssssssssssssbssssssssssssssssssssj:3
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
-
-
Target
c4b4c8152f8279bd2440201d33beb75aa3078ebc76c0622bb4778375afb08adc.exe
-
Size
4.8MB
-
MD5
985cf8c243e489e9cf622a77eea80478
-
SHA1
764087f8032abcb375155328fb2eaf3aef1140a9
-
SHA256
c4b4c8152f8279bd2440201d33beb75aa3078ebc76c0622bb4778375afb08adc
-
SHA512
61db554590996297fde5cd74e1713a3f29bc8469c5b28cf94a2f64a81ed806004b8614a1bc048665446b264bd6090454806cd080769422d01138d2e44a87e9fd
-
SSDEEP
3072:fv2BuEK/hTTK3EW2pL81kunExjRn21W62b0T3t:fXU0W2pL8CunExjNET3
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
-
-
Target
c4c197e50214b25100e10fb00b2ac6e0.exe
-
Size
273KB
-
MD5
c4c197e50214b25100e10fb00b2ac6e0
-
SHA1
1dfac5794ccab5ec1e3c4897b8069c85e44bde19
-
SHA256
91b9c5ee1050b5ba75f7ad5e1daace80e64220fc71cb4cda0a2265b0559afa5f
-
SHA512
11d6fca3edc71affd5ae97743ae2e3a4ed8172f73e1f1a4d799baeb335a1f2a0219f652b2bc5d4d6a45144b936e047842579a50926813eacd9b9be1bfb8a2878
-
SSDEEP
3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/s8sdTk:WFzDqa86hV6uRRqX1evPlwAEdA
Score10/10-
Asyncrat family
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
c4ca622404b5b4763e20a205a41db518.exe
-
Size
2.0MB
-
MD5
c4ca622404b5b4763e20a205a41db518
-
SHA1
a782fc1dc16fa55f8b7158f728f5c01fb0f955a2
-
SHA256
7e881d747f8a5b1e8ae2806b9495115ab1478a5df7fc40c42e862e4be1277753
-
SHA512
64c3eccdac84c83a692191512ef6e2abacfcb107a8343f03d51334e4cf4ce3aa43c9aff6d130bb69cdf4e90b635e8ab9d7bf1898e130614af45cdcbeaef2a3fc
-
SSDEEP
49152:TrYU+Yy4J8jao9UVlWAOjhRzsiYHjo++xTN:TdxVJC9UqRzsu+8N
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
-
-
Target
c50b533887d2992f66c414bd95339750.exe
-
Size
74KB
-
MD5
c50b533887d2992f66c414bd95339750
-
SHA1
740522dd71843b4025f50e523fd00c57215dc312
-
SHA256
381d149112fecee669c654b31fb14b708897ff7bfc2d3077b8e55a441f97cfd4
-
SHA512
de3c379afe3ffb08669db1bc432380cef2d1d894145d454bb2c98cc2661e965a6618a45a33a37c3e59ba55fc7141f98f41494ff393daf389ea6c414a83351bfe
-
SSDEEP
1536:LUN0cxVGlCBiPMVye9VdQuDI6H1bf/VjVQzc+LVclN:LU2cxVMWiPMVye9VdQsH1bftZQXBY
-
Asyncrat family
-
-
-
Target
c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe
-
Size
1.6MB
-
MD5
5355cb64d0008d7ed7267cebea8f9bc4
-
SHA1
4f8fc970efa45c2f547e8583b49eb543b778f001
-
SHA256
c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f
-
SHA512
cd662e6d9f215b18867056fe70d9b04b2eaf7090577546d038218dfe8716379654cb6e5f1c6ca3672e8bd1844d5e7810486164cf8fe99054305a89eb51b4bac6
-
SSDEEP
24576:Ksm8JijftfWIqZpyh/X6bSmV2GKz1oncoiF9GFwUvpHk3tSfEybcswrJ4gOEGEk:KD8Jijt+xpS/ekYmLGdhEAf7bCcjE
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-
-
-
Target
c520bfebf2b7ca231d0b6bb731bc67c608dad8f84583daab3f8d0783fa3ae7a2.exe
-
Size
6.6MB
-
MD5
d4beada3399cd28b1fc5724463215d7b
-
SHA1
5a909bcfef757eda9fc1370a3aa6e768bc191be6
-
SHA256
c520bfebf2b7ca231d0b6bb731bc67c608dad8f84583daab3f8d0783fa3ae7a2
-
SHA512
998cbaf0cdee86ee75ece589df34367f466b5998d6ed833c6e41654876b962c8a07180ee94e724152b4870fe765e7dc96e0eef11a1081305b69b92d19860b9d8
-
SSDEEP
196608:1Nsg4AMgAiNsg4AMgAqNsg4AMgASNsg4AMgAuNsg4AMgAB:1Gg4aBGg4aNGg4apGg4a5Gg4a+
-
Xred family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
c53059381a17db7f48cf6871b7869c48.exe
-
Size
71KB
-
MD5
c53059381a17db7f48cf6871b7869c48
-
SHA1
56afbdfcedd33f8002d4624a83ce4a07dea43454
-
SHA256
d462a5239f8b7933b6202c0cd440b2593ac44be6ac5e9d12b1f3f6ba675e0e2b
-
SHA512
85a4d82bc75cc2365668de13df983bdf4ae8d39c37161da2ef1d747eeaf1cb0b5585ea1f973b4671a725e54bd47f3d288cd6dfff2dc30ed886f968a1a18302f2
-
SSDEEP
1536:V0qYHDDZY5rgvZzOnAaDBnza+bhVB4gc8ivg6bPQROE2HkKQOT/B:qqkDDu5rs9Ozc+bf7j2IROaXaB
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
c59549cfc2b2687a8a799ef4b5c772e60d089fff5ccd837b46f07b019eb359b8.exe
-
Size
450KB
-
MD5
7f11e0f9b72d8db28b4c5db764044dc1
-
SHA1
8ea02f252178d7459a12846e396bdb8e2f982e98
-
SHA256
c59549cfc2b2687a8a799ef4b5c772e60d089fff5ccd837b46f07b019eb359b8
-
SHA512
ef0ea82060b80e843d9ccfd7f9718079539af3fb3817db149f7f9344d006be4e9ab67d7963ff08de6be994d54ce8c07abd76aedf000eb50945d93d11dad3bdbd
-
SSDEEP
6144:ul79nXgE03jDhZazH0Nmxwyg2e6VlWT8b9zYQt68Vw4wkGRR1V4rbA6DhKZm:i7fUaw+PVle8tJBwjxJZ
Score1/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2