General

  • Target

    Pass is Thunk - Onimai 1.7.1 (1).rar

  • Size

    11.4MB

  • Sample

    250406-l8vjnayns9

  • MD5

    39a00cb903601cdcc7e8560980c12ebc

  • SHA1

    79ed82c7e958de613c395592ffe4849a87ca84f6

  • SHA256

    ad70830f714dab841058a342f6e1d1838664a123bb9ee06c9e224d26389f59a6

  • SHA512

    9640854ad4c47555f83cdb7b9f8c60135e8693a31663ccfd9bb084334ebe00747027a581c0a81dd760a2302ab71465770ba2e0cee2d559c1262a1b8bfe91547d

  • SSDEEP

    196608:81ScDBvuzZoV0fgpErKMCFExitZ0uK+OpKfbnxK208bzDNEKsA:MtmzKV0fgpvyx6ZH8QNKabzP

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    5000

Extracted

Family

xworm

Version

5.0

Mutex

867aeGIEEecFXBcr

Attributes
  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/Hicz3DVN

aes.plain

Targets

    • Target

      Pass is Thunk - Onimai 1.7.1 (1).rar

    • Size

      11.4MB

    • MD5

      39a00cb903601cdcc7e8560980c12ebc

    • SHA1

      79ed82c7e958de613c395592ffe4849a87ca84f6

    • SHA256

      ad70830f714dab841058a342f6e1d1838664a123bb9ee06c9e224d26389f59a6

    • SHA512

      9640854ad4c47555f83cdb7b9f8c60135e8693a31663ccfd9bb084334ebe00747027a581c0a81dd760a2302ab71465770ba2e0cee2d559c1262a1b8bfe91547d

    • SSDEEP

      196608:81ScDBvuzZoV0fgpErKMCFExitZ0uK+OpKfbnxK208bzDNEKsA:MtmzKV0fgpvyx6ZH8QNKabzP

    • Detect Xworm Payload

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks