Threat name:
AsyncRAT, Njrat, RevengeRAT, StormKitty,
Alert
Classification:
rans.spre.phis.troj.adwa.spyw.expl.evad.mine
.NET source code contains potential unpacker
.NET source code contains very large strings
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Connects to a pastebin service (likely for C&C)
Contains functionality to log keystrokes (.Net Source)
Creates an autostart registry key pointing to binary in C:\Windows
Creates autostart registry keys with suspicious names
Creates files inside the volume driver (system volume information)
Creates multiple autostart registry keys
Disables zone checking for all users
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files to the startup folder
Drops PE files with benign system names
Drops script or batch files to the startup folder
Drops VBS files to the startup folder
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found RAT behaviour (information extraction to be send to C&C)
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Modifies the windows firewall
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Drops script at startup location
Snort IDS alert for network traffic
Suspicious execution chain found
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected BrowserPasswordDump
Yara detected StormKitty Stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1378347
Sample:
iUi6TG0GhX.exe
Startdate:
21/01/2024
Architecture:
WINDOWS
Score:
100
131
pastebin.com
2->131
133
noose.servehttp.com
2->133
135
6 other IPs or domains
2->135
153
Snort IDS alert for
network traffic
2->153
155
Multi AV Scanner detection
for domain / URL
2->155
157
Found malware configuration
2->157
161
23 other signatures
2->161
12
iUi6TG0GhX.exe
20
2->12
started
16
chrome.exe
2->16
started
19
Win32NT.exe
2->19
started
21
7 other processes
2->21
signatures3
159
Connects to a pastebin
service (likely for
C&C)
131->159
process4
dnsIp5
137
noose.servehttp.com
141.255.159.169, 4449, 49732, 49735
IELOIELOMainNetworkFR
France
12->137
119
C:\Windows\System32\Win32NT.exe, PE32
12->119
dropped
121
C:\Sexypornbabiesvideosandpictures\Porn.exe, PE32
12->121
dropped
23
Win32NT.exe
1
43
12->23
started
27
cmd.exe
12->27
started
29
vbc.exe
1
12->29
started
31
cmd.exe
12->31
started
139
ip-api.com
208.95.112.1
TUT-ASUS
United States
16->139
141
icanhazip.com
104.18.115.97
CLOUDFLARENETUS
United States
16->141
143
3 other IPs or domains
16->143
123
C:\Users\user\AppData\...\mineexplorer.exe, PE32+
16->123
dropped
125
C:\Users\user\AppData\...\UMMBDNEQBN.docx, ASCII
16->125
dropped
127
C:\Users\user\AppData\...\HTAGVDFUIE.png, ASCII
16->127
dropped
129
C:\Users\user\AppData\...\DVWHKMNFNN.xlsx, ASCII
16->129
dropped
145
Multi AV Scanner detection
for dropped file
16->145
147
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
16->147
149
Protects its processes
via BreakOnTermination
flag
16->149
151
5 other signatures
16->151
33
cmd.exe
16->33
started
file6
signatures7
process8
file9
101
C:\Users\user\AppData\...\explorer.exe, PE32
23->101
dropped
103
C:\Users\user\AppData\Local\...\575267982.exe, PE32
23->103
dropped
105
C:\Users\user\AppData\Local\...\569576654.exe, PE32
23->105
dropped
107
2 other malicious files
23->107
dropped
175
Multi AV Scanner detection
for dropped file
23->175
177
Drops script or batch
files to the startup
folder
23->177
179
Drops VBS files to the
startup folder
23->179
187
4 other signatures
23->187
35
569576654.exe
23->35
started
39
575267982.exe
23->39
started
41
vbc.exe
23->41
started
49
6 other processes
23->49
181
Bypasses PowerShell
execution policy
27->181
51
2 other processes
27->51
183
Drops PE files to the
startup folder
29->183
43
conhost.exe
29->43
started
53
3 other processes
31->53
185
Suspicious powershell
command line found
33->185
45
powershell.exe
33->45
started
47
conhost.exe
33->47
started
signatures10
process11
file12
87
C:\Users\user\AppData\Roaming\explorer.exe, PE32
35->87
dropped
163
Multi AV Scanner detection
for dropped file
35->163
165
Drops PE files with
benign system names
35->165
55
explorer.exe
35->55
started
89
C:\Users\user\AppData\Local\Temp\chrome.exe, PE32
39->89
dropped
167
Protects its processes
via BreakOnTermination
flag
39->167
169
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
39->169
171
Infects executable files
(exe, dll, sys, html)
39->171
91
C:\System Volume Information.exe, PE32
41->91
dropped
173
Creates files inside
the volume driver (system
volume information)
41->173
59
conhost.exe
41->59
started
61
cvtres.exe
41->61
started
63
mineexplorer.exe
45->63
started
93
C:\Users\user\AppData\Roaming\...\Win32NT.exe, PE32
49->93
dropped
95
C:\Recovery.exe, PE32
49->95
dropped
97
C:\PerfLogs.exe, PE32
49->97
dropped
99
2 other malicious files
49->99
dropped
65
conhost.exe
49->65
started
67
conhost.exe
49->67
started
69
conhost.exe
49->69
started
71
8 other processes
49->71
signatures13
process14
file15
109
C:\...\3eccc729eab990291ac501e9f53a5ebb.exe, PE32
55->109
dropped
111
C:\Users\user\AppData\...\tmp632D.tmp.exe, PE32+
55->111
dropped
113
C:\Users\user\AppData\...\tmp2052.tmp.exe, PE32+
55->113
dropped
189
System process connects
to network (likely due
to code injection or
exploit)
55->189
191
Multi AV Scanner detection
for dropped file
55->191
193
Protects its processes
via BreakOnTermination
flag
55->193
197
7 other signatures
55->197
73
tmp632D.tmp.exe
55->73
started
77
netsh.exe
55->77
started
79
Win32NT.exe
55->79
started
115
C:\ProgramData\explorer.exe, PE32+
63->115
dropped
195
Drops PE files with
benign system names
63->195
signatures16
process17
file18
117
C:\ProgramData\explorer_enhanced.exe, PE32+
73->117
dropped
199
Adds a directory exclusion
to Windows Defender
73->199
81
powershell.exe
73->81
started
83
conhost.exe
77->83
started
signatures19
process20
process21
85
conhost.exe
81->85
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.