General
-
Target
0ff72dee2aeaf5b9997f894062e4ed030640ae70b1c23553ed8b6cdb6b0aff7f
-
Size
145KB
-
Sample
250421-x4at8swms8
-
MD5
b900c0e763faad47a53198d13cb4e351
-
SHA1
681e3eb261e5a677a74aa7900ff83ab42d51ffaa
-
SHA256
0ff72dee2aeaf5b9997f894062e4ed030640ae70b1c23553ed8b6cdb6b0aff7f
-
SHA512
1e0987f291febf2414a2e9b628f89887764779e2b02a21c41047cd83efd92100dc89663b7db1f97ba12a0ab0d004bb26a9d8ca486401d775703b7442038730bd
-
SSDEEP
3072:lUTcx5zHoPMV1jDH1bGmWQte5BV0WUniyimyM7Y:lZHoPMVlVbkie5v0WURye
Behavioral task
behavioral1
Sample
0ff72dee2aeaf5b9997f894062e4ed030640ae70b1c23553ed8b6cdb6b0aff7f.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
0ff72dee2aeaf5b9997f894062e4ed030640ae70b1c23553ed8b6cdb6b0aff7f.exe
Resource
win11-20250410-en
Malware Config
Extracted
asyncrat
Tsurugi RATs
Default
89.117.49.234:4321
mlbmlgjnlwu
-
delay
1
-
install
true
-
install_file
Microsoft Edges.exe
-
install_folder
%AppData%
Extracted
xworm
5.0
89.117.49.234:4322
LNX9Jlg2lVc8Hr20
-
Install_directory
%AppData%
-
install_file
MicrosoftEdges.exe
Targets
-
-
Target
0ff72dee2aeaf5b9997f894062e4ed030640ae70b1c23553ed8b6cdb6b0aff7f
-
Size
145KB
-
MD5
b900c0e763faad47a53198d13cb4e351
-
SHA1
681e3eb261e5a677a74aa7900ff83ab42d51ffaa
-
SHA256
0ff72dee2aeaf5b9997f894062e4ed030640ae70b1c23553ed8b6cdb6b0aff7f
-
SHA512
1e0987f291febf2414a2e9b628f89887764779e2b02a21c41047cd83efd92100dc89663b7db1f97ba12a0ab0d004bb26a9d8ca486401d775703b7442038730bd
-
SSDEEP
3072:lUTcx5zHoPMV1jDH1bGmWQte5BV0WUniyimyM7Y:lZHoPMVlVbkie5v0WURye
-
Asyncrat family
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Modifies Windows Defender Real-time Protection settings
-
StormKitty payload
-
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
UAC bypass
-
Xworm family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1