General
-
Target
Pass is Thunk - Onimai 1.7.1 (1).rar
-
Size
11.4MB
-
Sample
250406-l8vjnayns9
-
MD5
39a00cb903601cdcc7e8560980c12ebc
-
SHA1
79ed82c7e958de613c395592ffe4849a87ca84f6
-
SHA256
ad70830f714dab841058a342f6e1d1838664a123bb9ee06c9e224d26389f59a6
-
SHA512
9640854ad4c47555f83cdb7b9f8c60135e8693a31663ccfd9bb084334ebe00747027a581c0a81dd760a2302ab71465770ba2e0cee2d559c1262a1b8bfe91547d
-
SSDEEP
196608:81ScDBvuzZoV0fgpErKMCFExitZ0uK+OpKfbnxK208bzDNEKsA:MtmzKV0fgpvyx6ZH8QNKabzP
Behavioral task
behavioral1
Sample
Pass is Thunk - Onimai 1.7.1 (1).rar
Resource
win10v2004-20250314-en
Malware Config
Extracted
quasar
-
reconnect_delay
5000
Extracted
xworm
5.0
867aeGIEEecFXBcr
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/Hicz3DVN
Targets
-
-
Target
Pass is Thunk - Onimai 1.7.1 (1).rar
-
Size
11.4MB
-
MD5
39a00cb903601cdcc7e8560980c12ebc
-
SHA1
79ed82c7e958de613c395592ffe4849a87ca84f6
-
SHA256
ad70830f714dab841058a342f6e1d1838664a123bb9ee06c9e224d26389f59a6
-
SHA512
9640854ad4c47555f83cdb7b9f8c60135e8693a31663ccfd9bb084334ebe00747027a581c0a81dd760a2302ab71465770ba2e0cee2d559c1262a1b8bfe91547d
-
SSDEEP
196608:81ScDBvuzZoV0fgpErKMCFExitZ0uK+OpKfbnxK208bzDNEKsA:MtmzKV0fgpvyx6ZH8QNKabzP
-
Detect Xworm Payload
-
Quasar family
-
Quasar payload
-
StormKitty payload
-
Stormkitty family
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1