General

  • Target

    4363463463464363463463463.zip

  • Size

    393KB

  • Sample

    250419-1r8saavzbx

  • MD5

    c223234ed4e0bc5325c0b09744f06b6d

  • SHA1

    ecfdd884ee353ceb205be8729eb683aeca5cce2e

  • SHA256

    fda46baacb7dcd211250fe29aaa2b1b17657961675b4d8c6415a0c3d004d00a6

  • SHA512

    b36c66d8c4c3c2d46a24bb85bd165e71b862f1de8cdc600f343f12a0238e3a5b3d48cb91a06acd6e0024e30798ddc715c211b4d59a65197d8058e3c937df4d1f

  • SSDEEP

    6144:mw6UunfgHXYz9cZLa2MM1ZDQblzXhVqWvSI6Xr6i5OywSiTbBeqscDoAUll4QwjS:mJUKz9cB3MMnmd+W6vXmi5ONvMc05yQ

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Extracted

Family

quasar

Version

1.4.1

Botnet

rat1

C2

unitedrat.ddns.net:4782

Mutex

5100ab61-a5a5-407f-af55-9e7766b9d637

Attributes
  • encryption_key

    AB7A97D9E0F9B0A44190A0D500EAB7AF37629802

  • install_name

    System32.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    System32

  • subdirectory

    System32

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.100.10:4782

biseo-48321.portmap.host:48321

192.168.1.10:4782

192.168.56.1:4782

Mutex

c30cf3c1-7b97-4704-8ee2-11d4f4a4a673

Attributes
  • encryption_key

    5B006AB32BA3239F1231429040DABB9E56ECB26B

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Extracted

Family

xworm

Version

5.0

C2

4.tcp.eu.ngrok.io:19432

imagine.here-for-more.info:3960

neverdiedico.mypets.ws:3960

nvdiemosole.broke-it.net:3960

37.48.64.102:3960

week-dictionary.gl.at.ply.gg:12466

event-dollar.gl.at.ply.gg:42627

Mutex

64Vg42Up8rwxA0t3

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain
aes.plain
aes.plain
aes.plain

Extracted

Family

quasar

Version

1.4.0.0

Botnet

Office

C2

45.136.51.217:5173

Mutex

QYKKiqqJ0K2HqPP0Mo

Attributes
  • encryption_key

    rFGYI3uEIwvomle2u8mk

  • install_name

    csrss.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    NET framework

  • subdirectory

    SubDir

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

127.0.0.1:8080

127.0.0.1:18274

6.tcp.eu.ngrok.io:6606

6.tcp.eu.ngrok.io:7707

6.tcp.eu.ngrok.io:8808

6.tcp.eu.ngrok.io:8080

6.tcp.eu.ngrok.io:18274

96.248.52.125:8031

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain
aes.plain

Extracted

Family

lumma

C2

https://zestmodp.top/zeda

https://jawdedmirror.run/ewqd

https://changeaie.top/geps

https://lonfgshadow.live/xawi

https://liftally.top/xasj

https://nighetwhisper.top/lekd

https://salaccgfa.top/gsooz

https://owlflright.digital/qopy

Extracted

Family

redline

Botnet

@glowfy0

C2

91.214.78.86:1912

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

172.204.136.22:1604

Mutex

ghbyTnUySCmF

Attributes
  • delay

    3

  • install

    false

  • install_file

    RoyalKing.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Version

Venom Pwn3rzs' Edtition v6.0.1

Botnet

V-lg60

C2

37.48.64.102:4950

Mutex

yawyrgpacvfvsfgbz

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

quasar

Version

3.1.5

Botnet

nEGRosis

C2

go-dramatically.gl.at.ply.gg:2676

Mutex

$Sxr-camQAVefBjk7nvL7ph

Attributes
  • encryption_key

    klJRtMXiJcydKsaanVG9

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Driver689

  • subdirectory

    temp

Extracted

Family

quasar

Version

1.4.1

Botnet

Helper Atanka

C2

193.203.238.136:8080

Mutex

14f39659-ca5b-4af7-8045-bed3500c385f

Attributes
  • encryption_key

    11049F2AEBDCF8E3A57474CD5FBA40FB2FFC5424

  • install_name

    diskutil.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    diskutil

  • subdirectory

    diskutil

Extracted

Family

quasar

Version

1.4.1

Botnet

DDNS

C2

193.161.193.99:32471

Mutex

807f3187-d087-4fff-beff-e73293a32af8

Attributes
  • encryption_key

    81A0C14D4C705B3C678E573C849DE7F6A3671A8B

  • install_name

    jusched.exe

  • log_directory

    CachedLogs

  • reconnect_delay

    3000

  • startup_key

    Java Update Scheduler

  • subdirectory

    Java

Extracted

Family

quasar

Version

1.4.1

Botnet

Runtime Broker

C2

senoc43726-29929.portmap.host:29929

Mutex

48854ba7-7fa3-48f5-bfc4-7f597af68d7d

Attributes
  • encryption_key

    26122B3BD81CEECD4FC3F2441D532F19A20471C6

  • install_name

    RuntimeBroker.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Runtime Broker

  • subdirectory

    discord

Extracted

Family

quasar

Version

1.4.1

Botnet

sigorta

C2

18.198.25.148:1604

Mutex

af7e773d-541a-46fd-87d3-06bb0a26aab9

Attributes
  • encryption_key

    D306945220105109C86E6E257D749CE885E76091

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Extracted

Family

stealc

Botnet

Line

C2

http://154.216.17.90

Attributes
  • url_path

    /a48146f6763ef3af.php

Extracted

Family

xworm

C2

127.0.0.1:6000

103.211.201.109:6000

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

  • telegram

    https://api.telegram.org/bot7929370892:AAGwrX5TeyxQidZdAEm_Z6-CDvPUOQzVY1M

Extracted

Family

lumma

C2

https://p3ar11fter.sbs/api

https://3xp3cts1aim.sbs/api

https://owner-vacat10n.sbs/api

https://peepburry828.sbs/api

https://p10tgrace.sbs/api

https://befall-sm0ker.sbs/api

https://librari-night.sbs/api

https://processhol.sbs/api

https://qualifiresui.cyou/api

Extracted

Family

quasar

Version

1.4.1

Botnet

Hubert Pilarczyk

C2

pawela827-35962.portmap.host:35962

Mutex

ca431979-125b-480f-adac-43c48c1e1832

Attributes
  • encryption_key

    39F4E87BBB832270AC54CA5065E707DFB3689A56

  • install_name

    vsjitdebuggerui.exe

  • log_directory

    CEF

  • reconnect_delay

    3000

  • startup_key

    Proces hosta dla zadań systemu Windows

  • subdirectory

    3880

Extracted

Family

vidar

Version

13.3

Botnet

70790cf457f5ee5e9df1780bfa648812

C2

https://t.me/lw25chm

https://steamcommunity.com/profiles/76561199839170361

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Extracted

Family

asyncrat

Version

Shadow X RAT & HVNC 1.0.0

Botnet

reWASD

C2

sayo0w.duckdns.org:7173

Mutex

2318923179jj27139792813j721983j7213987j98213j97823j789213j978213j978j12391239j913278321

Attributes
  • delay

    1

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    C:\WIndows

aes.plain

Extracted

Family

quasar

Version

1.4.1

Botnet

Nigga

C2

yzs-42879.portmap.host:42879

Mutex

57d72303-b5e9-46aa-8cc4-9690809c1a9e

Attributes
  • encryption_key

    F1EBDB1862062F9265C0B5AC4D02C76D026534D0

  • install_name

    svchost.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    Steam

Extracted

Family

quasar

Version

1.4.0

Botnet

svhost

C2

151.177.61.79:4782

Mutex

a148a6d8-1253-4e62-bc5f-c0242dd62e69

Attributes
  • encryption_key

    5BEC1A8BC6F8F695D1337C51454E0B7F3A4FE968

  • install_name

    svhost.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    svhost

  • subdirectory

    svhost

Extracted

Family

discordrat

Attributes
  • discord_token

    MTA4MDk4MTIyMDY1OTI5ODM1Nw.Ge9WdI.mgiKFBRpd3OMUTf1SBAtgUqqVPKf4evZxJ5nYU

  • server_id

    1080979971050319872

Targets

MITRE ATT&CK Enterprise v16

Tasks