General
-
Target
4363463463464363463463463.zip
-
Size
393KB
-
Sample
250419-1r8saavzbx
-
MD5
c223234ed4e0bc5325c0b09744f06b6d
-
SHA1
ecfdd884ee353ceb205be8729eb683aeca5cce2e
-
SHA256
fda46baacb7dcd211250fe29aaa2b1b17657961675b4d8c6415a0c3d004d00a6
-
SHA512
b36c66d8c4c3c2d46a24bb85bd165e71b862f1de8cdc600f343f12a0238e3a5b3d48cb91a06acd6e0024e30798ddc715c211b4d59a65197d8058e3c937df4d1f
-
SSDEEP
6144:mw6UunfgHXYz9cZLa2MM1ZDQblzXhVqWvSI6Xr6i5OywSiTbBeqscDoAUll4QwjS:mJUKz9cB3MMnmd+W6vXmi5ONvMc05yQ
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
4363463463464363463463463.exe
Resource
win11-20250410-en
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
quasar
1.4.1
rat1
unitedrat.ddns.net:4782
5100ab61-a5a5-407f-af55-9e7766b9d637
-
encryption_key
AB7A97D9E0F9B0A44190A0D500EAB7AF37629802
-
install_name
System32.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System32
-
subdirectory
System32
Extracted
quasar
1.4.1
Office04
192.168.100.10:4782
biseo-48321.portmap.host:48321
192.168.1.10:4782
192.168.56.1:4782
c30cf3c1-7b97-4704-8ee2-11d4f4a4a673
-
encryption_key
5B006AB32BA3239F1231429040DABB9E56ECB26B
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
xworm
5.0
4.tcp.eu.ngrok.io:19432
imagine.here-for-more.info:3960
neverdiedico.mypets.ws:3960
nvdiemosole.broke-it.net:3960
37.48.64.102:3960
week-dictionary.gl.at.ply.gg:12466
event-dollar.gl.at.ply.gg:42627
64Vg42Up8rwxA0t3
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
quasar
1.4.0.0
Office
45.136.51.217:5173
QYKKiqqJ0K2HqPP0Mo
-
encryption_key
rFGYI3uEIwvomle2u8mk
-
install_name
csrss.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
NET framework
-
subdirectory
SubDir
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:8080
127.0.0.1:18274
6.tcp.eu.ngrok.io:6606
6.tcp.eu.ngrok.io:7707
6.tcp.eu.ngrok.io:8808
6.tcp.eu.ngrok.io:8080
6.tcp.eu.ngrok.io:18274
96.248.52.125:8031
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
lumma
https://zestmodp.top/zeda
https://jawdedmirror.run/ewqd
https://changeaie.top/geps
https://lonfgshadow.live/xawi
https://liftally.top/xasj
https://nighetwhisper.top/lekd
https://salaccgfa.top/gsooz
https://owlflright.digital/qopy
Extracted
redline
@glowfy0
91.214.78.86:1912
Extracted
asyncrat
0.5.8
Default
172.204.136.22:1604
ghbyTnUySCmF
-
delay
3
-
install
false
-
install_file
RoyalKing.exe
-
install_folder
%AppData%
Extracted
asyncrat
Venom Pwn3rzs' Edtition v6.0.1
V-lg60
37.48.64.102:4950
yawyrgpacvfvsfgbz
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
quasar
3.1.5
nEGRosis
go-dramatically.gl.at.ply.gg:2676
$Sxr-camQAVefBjk7nvL7ph
-
encryption_key
klJRtMXiJcydKsaanVG9
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Driver689
-
subdirectory
temp
Extracted
quasar
1.4.1
Helper Atanka
193.203.238.136:8080
14f39659-ca5b-4af7-8045-bed3500c385f
-
encryption_key
11049F2AEBDCF8E3A57474CD5FBA40FB2FFC5424
-
install_name
diskutil.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
diskutil
-
subdirectory
diskutil
Extracted
quasar
1.4.1
DDNS
193.161.193.99:32471
807f3187-d087-4fff-beff-e73293a32af8
-
encryption_key
81A0C14D4C705B3C678E573C849DE7F6A3671A8B
-
install_name
jusched.exe
-
log_directory
CachedLogs
-
reconnect_delay
3000
-
startup_key
Java Update Scheduler
-
subdirectory
Java
Extracted
quasar
1.4.1
Runtime Broker
senoc43726-29929.portmap.host:29929
48854ba7-7fa3-48f5-bfc4-7f597af68d7d
-
encryption_key
26122B3BD81CEECD4FC3F2441D532F19A20471C6
-
install_name
RuntimeBroker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Runtime Broker
-
subdirectory
discord
Extracted
quasar
1.4.1
sigorta
18.198.25.148:1604
af7e773d-541a-46fd-87d3-06bb0a26aab9
-
encryption_key
D306945220105109C86E6E257D749CE885E76091
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
stealc
Line
http://154.216.17.90
-
url_path
/a48146f6763ef3af.php
Extracted
xworm
127.0.0.1:6000
103.211.201.109:6000
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
telegram
https://api.telegram.org/bot7929370892:AAGwrX5TeyxQidZdAEm_Z6-CDvPUOQzVY1M
Extracted
lumma
https://p3ar11fter.sbs/api
https://3xp3cts1aim.sbs/api
https://owner-vacat10n.sbs/api
https://peepburry828.sbs/api
https://p10tgrace.sbs/api
https://befall-sm0ker.sbs/api
https://librari-night.sbs/api
https://processhol.sbs/api
https://qualifiresui.cyou/api
Extracted
quasar
1.4.1
Hubert Pilarczyk
pawela827-35962.portmap.host:35962
ca431979-125b-480f-adac-43c48c1e1832
-
encryption_key
39F4E87BBB832270AC54CA5065E707DFB3689A56
-
install_name
vsjitdebuggerui.exe
-
log_directory
CEF
-
reconnect_delay
3000
-
startup_key
Proces hosta dla zadań systemu Windows
-
subdirectory
3880
Extracted
vidar
13.3
70790cf457f5ee5e9df1780bfa648812
https://t.me/lw25chm
https://steamcommunity.com/profiles/76561199839170361
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Extracted
asyncrat
Shadow X RAT & HVNC 1.0.0
reWASD
sayo0w.duckdns.org:7173
2318923179jj27139792813j721983j7213987j98213j97823j789213j978213j978j12391239j913278321
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
C:\WIndows
Extracted
quasar
1.4.1
Nigga
yzs-42879.portmap.host:42879
57d72303-b5e9-46aa-8cc4-9690809c1a9e
-
encryption_key
F1EBDB1862062F9265C0B5AC4D02C76D026534D0
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
Steam
Extracted
quasar
1.4.0
svhost
151.177.61.79:4782
a148a6d8-1253-4e62-bc5f-c0242dd62e69
-
encryption_key
5BEC1A8BC6F8F695D1337C51454E0B7F3A4FE968
-
install_name
svhost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svhost
-
subdirectory
svhost
Extracted
discordrat
-
discord_token
MTA4MDk4MTIyMDY1OTI5ODM1Nw.Ge9WdI.mgiKFBRpd3OMUTf1SBAtgUqqVPKf4evZxJ5nYU
-
server_id
1080979971050319872
Targets
-
-
Target
4363463463464363463463463.exe
-
Size
764KB
-
MD5
85e3d4ac5a6ef32fb93764c090ef32b7
-
SHA1
adedb0aab26d15cf96f66fda8b4cfbbdcc15ef52
-
SHA256
4e5cc8cb98584335400d00f0a0803c3e0202761f3fbe50bcab3858a80df255e1
-
SHA512
a7a037bde41bcd425be18a712e27a793185f7fde638e139bbd9d253c371cd9622385eda39cf91ab715ead2591cff5b8c9f5b31d903f138d8af7bab6a9001ccab
-
SSDEEP
12288:6MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Ufbj:6nsJ39LyjbJkQFMhmC+6GD9mH
Score10/10asyncratlummaquasarredlinevenomratxredxworm@glowfy0defaultofficeoffice04rat1v-lg60backdoordefense_evasiondiscoveryexecutioninfostealerpersistenceprivilege_escalationpyinstallerratspywarestealertrojanupxvmprotectdiscordratlockbitmimikatzsliverstealcvidar70790cf457f5ee5e9df1780bfa648812ddnshelper atankahubert pilarczyklinenegrosisniggarewasdruntime brokersigortasvhostransomwarerootkit-
Asyncrat family
-
Detect Vidar Stealer
-
Detect Xworm Payload
-
Discordrat family
-
Lockbit family
-
Lumma family
-
Mimikatz family
-
Quasar family
-
Quasar payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Rule to detect Lockbit 3.0 ransomware Windows payload
-
Sliver RAT v2
-
Sliver family
-
Stealc family
-
Venomrat family
-
Vidar family
-
Xred family
-
Xworm family
-
Async RAT payload
-
mimikatz is an open source tool to dump credentials on Windows
-
Downloads MZ/PE file
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Modifies Windows Firewall
-
Sets service image path in registry
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
4Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1