General
-
Target
samples-downloader.zip
-
Size
2.5MB
-
Sample
250521-xn1qqa1jz2
-
MD5
f58686141eb7738cfcc9a5664623d78a
-
SHA1
bfcb6a5f3c72d151f653bd5cb7657052699d8119
-
SHA256
0cdb7e138b0cb45bb651c3be720ff172cd88fcaeadcf685d6549bb0ec4c118a9
-
SHA512
76c9d9df38676cafb079889b885bdce4ca019b868ed1c7a89f099ed7a0ad03d8d3ed9fffe5542b0320f89c90ff0989bb4d54d30e5b147e7175f858b73658033a
-
SSDEEP
49152:m33FFgt8FL8Ay4xlxuw1hIQELMTRW+UiSzwPLeYfT8jYA7FztErLizHGF4WT4goR:m33q2O4xu/Q8MTRW+czb9jYA7FztEdFs
Static task
static1
Behavioral task
behavioral1
Sample
samples-downloader.zip
Resource
win11-20250508-en
Malware Config
Extracted
xenorat
192.248.152.36
Installer
-
delay
1
-
install_path
appdata
-
port
37189
-
startup_name
Google Chrome
Extracted
xworm
5.0
104.234.124.55:3360
127.0.0.1:7000
dnsuo.ddns.net:8485
P737CuJH08tJnvsR
-
install_file
USB.exe
Extracted
lumma
https://medicalbitkisel.net/juj
https://orjinalecza.net/lxaz
https://eczakozmetik.net/qop
https://orijinalecza.org/jub
https://tortoisgfe.top/paxk
https://eczamedikal.org/vax
https://orijinalecza.net/kazd
https://rsnakejh.top/adsk
https://tropiscbs.live/iuwxx
https://geographys.run/eirq
https://woodpeckersd.run/glsk
https://cartograhphy.top/ixau
https://biosphxere.digital/tqoa
https://topographky.top/xlak
https://climatologfy.top/kbud
https://vigorbridgoe.top/banb
https://3clarmodq.top/qoxo
https://jawdedmirror.run/ewqd
https://changeaie.top/geps
https://lonfgshadow.live/xawi
https://eliftally.top/xasj
https://nighetwhisper.top/lekd
https://salaccgfa.top/gsooz
https://zestmodp.top/zeda
https://owlflright.digital/qopy
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.wxtp.store - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@@# - Email To:
[email protected]
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
65.108.77.73:3899
wqgxzrdwqizdhf
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
arrowrat
xxx
65.108.77.73:1330
uwDUxBeCD
Extracted
xworm
162.250.188.82:7000
-
Install_directory
%AppData%
-
install_file
Microsoft365.exe
Targets
-
-
Target
samples-downloader.zip
-
Size
2.5MB
-
MD5
f58686141eb7738cfcc9a5664623d78a
-
SHA1
bfcb6a5f3c72d151f653bd5cb7657052699d8119
-
SHA256
0cdb7e138b0cb45bb651c3be720ff172cd88fcaeadcf685d6549bb0ec4c118a9
-
SHA512
76c9d9df38676cafb079889b885bdce4ca019b868ed1c7a89f099ed7a0ad03d8d3ed9fffe5542b0320f89c90ff0989bb4d54d30e5b147e7175f858b73658033a
-
SSDEEP
49152:m33FFgt8FL8Ay4xlxuw1hIQELMTRW+UiSzwPLeYfT8jYA7FztErLizHGF4WT4goR:m33q2O4xu/Q8MTRW+czb9jYA7FztEdFs
-
Arrowrat family
-
Asyncrat family
-
Detect XenoRat Payload
-
Detect Xworm Payload
-
Detects DonutLoader
-
Detects Rhadamanthys payload
-
DonutLoader
DonutLoader is a position-independent code that enables in-memory execution of VBScript, JScript, EXE, DLL files and dotNET assemblies.
-
Donutloader family
-
Lumma family
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Xenorat family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Possible privilege escalation attempt
-
Stops running service(s)
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Modify Authentication Process
1Power Settings
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Impair Defenses
1Modify Authentication Process
1Modify Registry
3Obfuscated Files or Information
1Command Obfuscation
1Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Process Discovery
1Query Registry
8Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2