Overview
overview
10Static
static
3xRAT v2.0/...lt.exe
windows7-x64
7xRAT v2.0/...lt.exe
windows10-2004-x64
10xRAT v2.0/...il.dll
windows7-x64
1xRAT v2.0/...il.dll
windows10-2004-x64
1xRAT v2.0/...at.dll
windows7-x64
1xRAT v2.0/...at.dll
windows10-2004-x64
1xRAT v2.0/...ib.dll
windows7-x64
1xRAT v2.0/...ib.dll
windows10-2004-x64
1xRAT v2.0/client.exe
windows7-x64
6xRAT v2.0/client.exe
windows10-2004-x64
10xRAT v2.0/xRAT 2.exe
windows7-x64
1xRAT v2.0/xRAT 2.exe
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-07-2024 01:36
Static task
static1
Behavioral task
behavioral1
Sample
xRAT v2.0/Client-built.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
xRAT v2.0/Client-built.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
xRAT v2.0/Mono.Cecil.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
xRAT v2.0/Mono.Cecil.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
xRAT v2.0/Mono.Nat.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
xRAT v2.0/Mono.Nat.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
xRAT v2.0/Vestris.ResourceLib.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
xRAT v2.0/Vestris.ResourceLib.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
xRAT v2.0/client.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
xRAT v2.0/client.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
xRAT v2.0/xRAT 2.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
xRAT v2.0/xRAT 2.exe
Resource
win10v2004-20240704-en
General
-
Target
xRAT v2.0/client.exe
-
Size
271KB
-
MD5
9d697a19004e86acede9ee1bef4ff664
-
SHA1
6193e527615492a1525f10172fefd69460170484
-
SHA256
ac1fa54c26a22f25b1d78ab15315f48339eca43645162de8ad9c77d83a7c7f0a
-
SHA512
25f26e09f50425c762e370bd7873d782aea7cd0328b30b0ed29e09692b5b380fdee1934d43c68848cace432dd9615791225f2531b3bb274c49d4cb692e50689d
-
SSDEEP
3072:tDcnJEoBClZIwxVHOK7Vef43d73l1dRHHg2IgJnNDcBkbzsJmrh/SC1uq0RN8kfn:tDcXWZPXQf4th1LguJzbz048
Malware Config
Signatures
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 api.ipify.org 3 api.ipify.org 4 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
client.exedescription pid process Token: SeDebugPrivilege 924 client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
client.exepid process 924 client.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/924-0-0x000007FEF687E000-0x000007FEF687F000-memory.dmpFilesize
4KB
-
memory/924-1-0x000007FEF65C0000-0x000007FEF6F5D000-memory.dmpFilesize
9.6MB
-
memory/924-2-0x000007FEF65C0000-0x000007FEF6F5D000-memory.dmpFilesize
9.6MB
-
memory/924-3-0x000007FEF65C0000-0x000007FEF6F5D000-memory.dmpFilesize
9.6MB
-
memory/924-5-0x000007FEF687E000-0x000007FEF687F000-memory.dmpFilesize
4KB
-
memory/924-6-0x000007FEF65C0000-0x000007FEF6F5D000-memory.dmpFilesize
9.6MB
-
memory/924-7-0x000007FEF65C0000-0x000007FEF6F5D000-memory.dmpFilesize
9.6MB