Resubmissions
19/04/2025, 19:51
250419-ykybvstwet 10General
-
Target
https://github.com/doodoofart3443/ZM-ULTI/raw/refs/heads/main/Ultima%20Multihack%20V3.55.rar
-
Sample
250419-ykybvstwet
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/doodoofart3443/ZM-ULTI/raw/refs/heads/main/Ultima%20Multihack%20V3.55.rar
Resource
win11-20250410-en
Malware Config
Extracted
asyncrat
0.5.8
Default
jvjv2044duck33.duckdns.org:8808
0fC8zJGwBBNm
-
delay
3
-
install
true
-
install_file
csrss.exe
-
install_folder
%AppData%
Extracted
darkcomet
Guest16
jvjv2044duck33.duckdns.org:1604
DC_MUTEX-CK7UE3N
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
Jp74nsvbhc4i
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
https://github.com/doodoofart3443/ZM-ULTI/raw/refs/heads/main/Ultima%20Multihack%20V3.55.rar
-
Asyncrat family
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Nanocore family
-
UAC bypass
-
Async RAT payload
-
Blocklisted process makes network request
-
Disables Task Manager via registry modification
-
Download via BitsAdmin
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
BITS Jobs
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1BITS Jobs
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
4Subvert Trust Controls
1SIP and Trust Provider Hijacking
1