General
-
Target
pc raper.exe
-
Size
26.1MB
-
Sample
250411-xmz3ssxxaw
-
MD5
769bf15770789de44c623b22536b9af8
-
SHA1
201bc12c782591a524b76a03c815251558bc0e21
-
SHA256
adfd4e9f51bcd27935f153e44b060b6978f55da9135f34cc62361dbbf2d2db57
-
SHA512
5ea37c53c01596c067824c698e234b3cddbae8f37ccfe5588629e9bd68eeab3a84b9e3985899f3686d247153f19945b3155ab52899f0e7049f0375c0c8740c18
-
SSDEEP
393216:c7Uy3zMOT7pkSmtK0NsDrAggcSYwybUG7Syl3SIspfXvYKiTSOQ1edHpDnWK:Q4MOSkqvAggG1QmSycIifXvzTPK
Static task
static1
Behavioral task
behavioral1
Sample
pc raper.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
pc raper.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
pc raper.exe
Resource
win11-20250410-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Extracted
C:\Users\Public\Documents\RGNR_8EA808C5.txt
1BKK8bsFfG3YxTd3N15GxaYfHopoThXoY4
https://tox.chat/download.html
Extracted
xworm
5.0
outside-sand.gl.at.ply.gg:31300
enter-sierra.gl.at.ply.gg:55389
uGoUQjcjqoZsiRJZ
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
1.tcp.ap.ngrok.io:21049
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
stealc
default
http://185.215.113.17
http://91.202.233.158
-
url_path
/2fb6c2cc8dce150a.php
Extracted
quasar
1.4.1
RuntimeBroker
qrpn9be.localto.net:2810
fc5edab1-6e8f-4963-98aa-bd077e08750f
-
encryption_key
F749DCAC94A1FC3102D2B0CFBBFCB76086F86568
-
install_name
RuntimeBroker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
RuntimeBroker
-
subdirectory
a7
Extracted
azorult
http://195.245.112.115/index.php
Extracted
quasar
1.4.1
rat1
147.185.221.24:15249
da67ff1b-f911-4ad4-a51c-c7c5bd13aeb3
-
encryption_key
AB7A97D9E0F9B0A44190A0D500EAB7AF37629802
-
install_name
System32.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System32
-
subdirectory
System32
Extracted
lumma
https://4triplooqp.world/APowko
https://esccapewz.run/ANSbwqy
https://travewlio.shop/ZNxbHi
https://qtouvrlane.bet/ASKwjq
https://sighbtseeing.shop/ASJnzh
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://holidamyup.today/AOzkns
https://triplooqp.world/APowko
https://6advennture.top/GKsiio
https://oreheatq.live/gsopp
https://castmaxw.run/ganzde
https://weldorae.digital/geds
https://5steelixr.live/aguiz
https://smeltingt.run/giiaus
https://ferromny.digital/gwpd
https://galxnetb.today/GsuIAo
https://metalsyo.digital/opsa
https://0ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://starcloc.bet/GOksAo
https://otargett.top/dsANGt
https://spacedbv.world/EKdlsk
Extracted
redline
185.215.113.9:12617
Extracted
marsstealer
Default
kenesrakishev.net/wp-admin/admin-ajax.php
Extracted
lumma
https://servicedny.site/api
https://authorisev.site/api
https://faulteyotk.site/api
https://dilemmadu.site/api
https://contemteny.site/api
https://goalyfeastz.site/api
https://opposezmny.site/api
https://seallysl.site/api
https://blasterrysbio.cyou/api
https://p3ar11fter.sbs/api
https://3xp3cts1aim.sbs/api
https://owner-vacat10n.sbs/api
https://peepburry828.sbs/api
https://p10tgrace.sbs/api
https://befall-sm0ker.sbs/api
https://librari-night.sbs/api
https://processhol.sbs/api
https://borderkjsyui.shop/api
Extracted
xworm
193.222.96.100:5555
45.200.148.216:7001
147.185.221.22:47930
127.0.0.1:47930
45.66.231.231:7000
-
Install_directory
%Temp%
-
install_file
requirements.exe
Extracted
quasar
1.5.0
Solara
193.161.193.99:41287
78ec4093-fbaf-42a6-926a-0b74c591daab
-
encryption_key
5A4FAA19514E91647773997414807E56C17126F3
-
install_name
XtuService.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
XtuService
-
subdirectory
SubDir
Extracted
quasar
1.4.0
Office04
192.168.31.99:4782
2001:4bc9:1f98:a4e::676:4782
255.255.255.0:4782
fe80::cabf:4cff:fe84:9572%17:4782
1f65a787-81b8-4955-95e4-b7751e10cd50
-
encryption_key
A0B82A50BBC49EC084E3E53A9E34DF58BD7050B9
-
install_name
Java Updater.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Java Updater
-
subdirectory
SubDir
Extracted
Protocol: ftp- Host:
ftpcluster.loopia.se - Port:
21 - Username:
srbreferee.com - Password:
luka2005
Extracted
Protocol: ftp- Host:
ftpcluster.loopia.se - Port:
21 - Username:
PRGUpdate - Password:
hokejnaledu
Extracted
quasar
1.4.1
ROBLOX EXECUTOR
192.168.50.1:4782
10.0.0.113:4782
LETSQOOO-62766.portmap.host:62766
89.10.178.51:4782
90faf922-159d-4166-b661-4ba16af8650e
-
encryption_key
FFEE70B90F5EBED6085600C989F1D6D56E2DEC26
-
install_name
windows 3543.exe
-
log_directory
roblox executor
-
reconnect_delay
3000
-
startup_key
windows background updater
-
subdirectory
windows updater
Extracted
redline
newbundle2
185.215.113.67:15206
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
8TdjLZxCzOjI
-
delay
3
-
install
true
-
install_file
client.exe
-
install_folder
%AppData%
Extracted
redline
bundle
185.215.113.67:15206
Extracted
quasar
1.4.1
Krzysztof Jędrzejczyk
pawela827-35962.portmap.host:35962
3d81233e-0447-4053-be5d-a375a921346c
-
encryption_key
39F4E87BBB832270AC54CA5065E707DFB3689A56
-
install_name
vsjitdebuggerui.exe
-
log_directory
CEF
-
reconnect_delay
3000
-
startup_key
Proces hosta dla zadań systemu Windows
-
subdirectory
3880
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
85.198.108.36:7667
egghlcckqridunl
-
delay
6
-
install
false
-
install_folder
%Temp%
Extracted
darkcomet
BROUTEUR
voltazur.ddns.net:1604
DC_MUTEX-CLRHTUN
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
cVxQXF1dUQRM
-
install
true
-
offline_keylogger
false
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
pc raper.exe
-
Size
26.1MB
-
MD5
769bf15770789de44c623b22536b9af8
-
SHA1
201bc12c782591a524b76a03c815251558bc0e21
-
SHA256
adfd4e9f51bcd27935f153e44b060b6978f55da9135f34cc62361dbbf2d2db57
-
SHA512
5ea37c53c01596c067824c698e234b3cddbae8f37ccfe5588629e9bd68eeab3a84b9e3985899f3686d247153f19945b3155ab52899f0e7049f0375c0c8740c18
-
SSDEEP
393216:c7Uy3zMOT7pkSmtK0NsDrAggcSYwybUG7Syl3SIspfXvYKiTSOQ1edHpDnWK:Q4MOSkqvAggG1QmSycIifXvzTPK
Score10/10asyncratazorultlummamarsstealerquasarragnarlockerredlinesquirrelwafflestealcwannacryxwormzharkbotdefaultoffice04rat1runtimebrokersolarabootkitbotnetcredential_accessdefense_evasiondiscoverydownloaderexecutionimpactinfostealerpersistencepyinstallerransomwareratspywarestealertrojanwormmimikatznetsupportbundlenewbundle2roblox executordarkcometphorphiexbrouteurkrzysztof jędrzejczykloaderthemida-
Asyncrat family
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Darkcomet family
-
Detect Xworm Payload
-
Detects ZharkBot payload
ZharkBot is a botnet written C++.
-
Lumma family
-
Marsstealer family
-
Mimikatz family
-
Modifies visiblity of hidden/system files in Explorer
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Phorphiex family
-
Phorphiex payload
-
Quasar family
-
Quasar payload
-
RagnarLocker
Ransomware first seen at the end of 2019, which has been used in targetted attacks against multiple companies.
-
Ragnarlocker family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Squirrelwaffle family
-
Stealc family
-
Wannacry family
-
Xworm family
-
Zharkbot family
-
Async RAT payload
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (9360) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Squirrelwaffle payload
-
mimikatz is an open source tool to dump credentials on Windows
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Modifies Windows Firewall
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Indicator Removal: Clear Persistence
Clear artifacts associated with previously established persistence like scheduletasks on a host.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
3Hidden Files and Directories
3Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3Clear Persistence
1File Deletion
2Modify Registry
5Pre-OS Boot
1Bootkit
1Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Process Discovery
1Query Registry
6System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
1