General
-
Target
250519-ajxrya1js5.bin
-
Size
28.0MB
-
Sample
250519-any6kafn5s
-
MD5
9d5cc021c717c67eddfbf3e02b5e6dc5
-
SHA1
dd333af1d10fb0ea0542e878a0b70bdba22b469c
-
SHA256
1b3e438ef3a09058ddc016b8b7dda3cfde411c773a45eae629f36202b83a86f5
-
SHA512
9f0b92c7d3452f2de97ea3e69dc72423606132a5b5e3092f4424ecba184b003622c7ca7dc5d722e2a5157f38f66128781021eab323784544a1f846c44bd7ae2f
-
SSDEEP
786432:AWZL9CVOBV7QGst9Ozg90Sp0XCCLAkq9wKdMPpbs:AWZL9WOBVsGst9Ozg5ICUzVNBb
Static task
static1
Behavioral task
behavioral1
Sample
250519-ajxrya1js5.exe
Resource
win10v2004-20250502-en
Malware Config
Extracted
http://185.156.72.2/testmine/random.exe
Extracted
http://185.156.72.2/testmine/random.exe
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Extracted
discordrat
-
discord_token
MTM0OTU1Nzg2MTk3NzY4NjExOA.GZnBJ8.ModoCKrx8GueOq0zGHlbO14l4wHwAZe9839-DA
-
server_id
1350894549899411528
Extracted
redline
cheat
154.91.34.165:64951
Extracted
vidar
13.6
158fdd2a4f5abb978509580715e5353f
https://t.me/m00f3r
https://steamcommunity.com/profiles/76561199851454339
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Extracted
C:\d_cachereB61PokrQs2r82R\Data breach warning.txt
https://qtox.github.io
http://raworldw32b2qxevn3gp63pvibgixr4v75z62etlptg3u3pmajwra4ad.onion
http://161.35.200.18
https://gofile.io/d/ufuFye
Extracted
C:\fnsYm5R5i.README.txt
lockbit
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion
http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion
http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion
http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion
http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion
http://lockbitapt.uz
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion.ly
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion.ly
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion.ly
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion.ly
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion.ly
http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion.ly
http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion.ly
http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion.ly
http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion.ly
https://twitter.com/hashtag/lockbit?f=live
http://lockbitsupt7nr3fa6e7xyb73lk6bw6rcneqhoyblniiabj4uwvzapqd.onion
http://lockbitsupuhswh4izvoucoxsbnotkmgq6durg7kficg6u33zfvq3oyd.onion
http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion
http://lockbitsupp.uz
https://tox.chat/download.html
Extracted
C:\ahIFlNJOT.README.txt
lockbit
https://twitter.com/hashtag/lockbit?f=live
https://tox.chat/download.html
Extracted
masslogger
-
exfiltration_mode
#SMTPEnabled
-
expire_time_date
2025-06-14
-
host_password
DhakaHome2024
-
host_port
587
- host_receiver
- host_sender
-
host_server
mail.dhakahome.com
-
ssl_slate
True
Extracted
vipkeylogger
Extracted
xworm
5.0
paltalkroom.ddns.net:65236
Y1mBse1uakfJ6zP1
-
Install_directory
%Temp%
-
install_file
test.exe
Targets
-
-
Target
250519-ajxrya1js5.bin
-
Size
28.0MB
-
MD5
9d5cc021c717c67eddfbf3e02b5e6dc5
-
SHA1
dd333af1d10fb0ea0542e878a0b70bdba22b469c
-
SHA256
1b3e438ef3a09058ddc016b8b7dda3cfde411c773a45eae629f36202b83a86f5
-
SHA512
9f0b92c7d3452f2de97ea3e69dc72423606132a5b5e3092f4424ecba184b003622c7ca7dc5d722e2a5157f38f66128781021eab323784544a1f846c44bd7ae2f
-
SSDEEP
786432:AWZL9CVOBV7QGst9Ozg90Sp0XCCLAkq9wKdMPpbs:AWZL9WOBVsGst9Ozg5ICUzVNBb
Score10/10ades_stealerchaosdcratdiscordratdragonforcefloxiflockbitmassloggermodiloaderredlinerokratsalitysectopratumbralvidarvipkeyloggerxoristxworm158fdd2a4f5abb978509580715e5353fcheataspackv2backdoorcredential_accessdiscoveryexecutioninfostealerkeyloggerpersistenceransomwareratrootkitspywarestealertrojanupx-
Ades_stealer family
-
Chaos Ransomware
-
Chaos family
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Detect Rokrat payload
-
Detect Umbral payload
-
Detect Vidar Stealer
-
Detect Xworm Payload
-
Detected Xorist Ransomware
-
Detects AdesStealer
-
Discordrat family
-
DragonForce
Ransomware family based on Lockbit that was first observed in November 2023.
-
Dragonforce family
-
Floxif family
-
Lockbit family
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Masslogger family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Rokrat family
-
Rule to detect Lockbit 3.0 ransomware Windows payload
-
Sality family
-
SectopRAT payload
-
Sectoprat family
-
Umbral family
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vidar family
-
Vipkeylogger family
-
Xorist family
-
Xworm family
-
DCRat payload
-
Detects Floxif payload
-
ModiLoader Second Stage
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Authentication Process
1Modify Registry
1