General
-
Target
https://gofile.io/d/1sr5II
-
Sample
250417-1skf3stses
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/1sr5II
Resource
win10v2004-20250410-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Extracted
marsstealer
Default
kenesrakishev.net/wp-admin/admin-ajax.php
Extracted
C:\Users\Public\Documents\RGNR_847D862D.txt
1BKK8bsFfG3YxTd3N15GxaYfHopoThXoY4
https://tox.chat/download.html
Extracted
xworm
5.0
outside-sand.gl.at.ply.gg:31300
VQd9MfbX4V71RInT
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
lumma
https://crib-endanger.sbs/api
https://faintbl0w.sbs/api
https://300snails.sbs/api
https://bored-light.sbs/api
https://3xc1aimbl0w.sbs/api
https://pull-trucker.sbs/api
https://fleez-inc.sbs/api
https://thicktoys.sbs/api
https://automatic-meaty.sbs/api
https://servicedny.site/api
https://authorisev.site/api
https://faulteyotk.site/api
https://dilemmadu.site/api
https://contemteny.site/api
https://goalyfeastz.site/api
https://opposezmny.site/api
https://seallysl.site/api
https://thighpecr.cyou/api
Extracted
darkcomet
AUTRE
voltazur.ddns.net:1604
DC_MUTEX-0F1C40C
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
djHf5i8YgrmK
-
install
true
-
offline_keylogger
false
-
persistence
true
-
reg_key
MicroUpdate
Extracted
quasar
1.3.0.0
sigorta
217.195.197.170:1604
QSR_MUTEX_9WjAcLINYji1uqfzRt
-
encryption_key
B2vTTMiPGqHXv2xzSGYH
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
redline
am
185.215.113.25:13686
Extracted
quasar
1.4.1
Office04
testinghigger-42471.portmap.host:42471
7a5f2afa-38ce-4bed-8e42-d1108199a2b3
-
encryption_key
0F8B61E5223AD57FA54A04631691138A0F76FAE4
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
wod2
-
subdirectory
SubDir
Extracted
xworm
147.185.221.25:63795
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
https://gofile.io/d/1sr5II
-
Darkcomet family
-
Detect Xworm Payload
-
Lumma family
-
Marsstealer family
-
Quasar family
-
Quasar payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Squirrelwaffle family
-
Wannacry family
-
Xworm family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Squirrelwaffle payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Modifies file permissions
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1