Threat name:
AsyncRAT, Blank Grabber, XWorm
Alert
Classification:
rans.troj.spyw.expl.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Creates files with lurking names (e.g. Crack.exe)
Encrypted powershell cmdline option found
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Removes signatures from Windows Defender
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Rar Usage with Password and Compression Level
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Uses netsh to modify the Windows network and firewall settings
Very long command line found
Writes or reads registry keys via WMI
Yara detected Blank Grabber
Yara detected Generic Downloader
Yara detected Telegram RAT
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1486895
Sample:
Base.exe
Startdate:
02/08/2024
Architecture:
WINDOWS
Score:
100
118
ip-api.com
2->118
120
gl.at.ply.gg
2->120
122
discord.com
2->122
140
Found malware configuration
2->140
142
Malicious sample detected
(through community Yara
rule)
2->142
144
Antivirus detection
for dropped file
2->144
146
26 other signatures
2->146
13
Base.exe
3
2->13
started
signatures3
process4
file5
114
C:\Users\user\AppData\...\XClifsaent.exe, PE32
13->114
dropped
116
C:\Users\user\AppData\...116ursultan Alpha.exe, PE32
13->116
dropped
198
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
13->198
17
Nursultan Alpha.exe
4
13->17
started
21
XClifsaent.exe
14
3
13->21
started
signatures6
process7
dnsIp8
94
C:\Users\user\AppData\Local\...\XCli fent.exe, PE32
17->94
dropped
96
C:\Users\user\AppData\...\CrackLauncher.exe, PE32+
17->96
dropped
98
C:\Users\user\AppData\Local\Temp\Built.exe, PE32+
17->98
dropped
128
Creates files with lurking
names (e.g. Crack.exe)
17->128
130
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
17->130
24
Built.exe
22
17->24
started
28
CrackLauncher.exe
4
2
17->28
started
30
XCli fent.exe
14
3
17->30
started
124
ip-api.com
208.95.112.1, 49704, 49705, 49716
TUT-ASUS
United States
21->124
132
Antivirus detection
for dropped file
21->132
134
Multi AV Scanner detection
for dropped file
21->134
136
Machine Learning detection
for dropped file
21->136
138
2 other signatures
21->138
32
powershell.exe
21->32
started
34
powershell.exe
21->34
started
36
powershell.exe
21->36
started
file9
signatures10
process11
file12
104
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
24->104
dropped
106
C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+
24->106
dropped
108
C:\Users\user\AppData\Local\...\select.pyd, PE32+
24->108
dropped
110
16 other malicious files
24->110
dropped
180
Multi AV Scanner detection
for dropped file
24->180
182
Very long command line
found
24->182
184
Modifies Windows Defender
protection settings
24->184
190
2 other signatures
24->190
38
Built.exe
1
100
24->38
started
42
cmd.exe
1
28->42
started
44
conhost.exe
28->44
started
186
Adds a directory exclusion
to Windows Defender
30->186
46
powershell.exe
30->46
started
48
powershell.exe
30->48
started
188
Loading BitLocker PowerShell
Module
32->188
50
conhost.exe
32->50
started
52
conhost.exe
34->52
started
54
conhost.exe
36->54
started
signatures13
process14
dnsIp15
126
discord.com
162.159.135.232, 443, 49717
CLOUDFLARENETUS
United States
38->126
148
Very long command line
found
38->148
150
Found many strings related
to Crypto-Wallets (likely
being stolen)
38->150
152
Tries to harvest and
steal browser information
(history, passwords,
etc)
38->152
162
6 other signatures
38->162
56
cmd.exe
38->56
started
59
cmd.exe
38->59
started
61
cmd.exe
38->61
started
67
23 other processes
38->67
154
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
42->154
156
Suspicious powershell
command line found
42->156
158
Encrypted powershell
cmdline option found
42->158
164
2 other signatures
42->164
160
Loading BitLocker PowerShell
Module
46->160
63
conhost.exe
46->63
started
65
conhost.exe
48->65
started
signatures16
process17
signatures18
166
Very long command line
found
56->166
168
Encrypted powershell
cmdline option found
56->168
69
powershell.exe
56->69
started
72
conhost.exe
56->72
started
170
Modifies Windows Defender
protection settings
59->170
172
Removes signatures from
Windows Defender
59->172
74
powershell.exe
59->74
started
85
2 other processes
59->85
174
Adds a directory exclusion
to Windows Defender
61->174
77
powershell.exe
61->77
started
79
conhost.exe
61->79
started
176
Suspicious powershell
command line found
67->176
178
Tries to harvest and
steal WLAN passwords
67->178
81
getmac.exe
67->81
started
83
systeminfo.exe
67->83
started
87
44 other processes
67->87
process19
file20
100
C:\Users\user\AppData\...\hg0ieary.cmdline, Unicode
69->100
dropped
89
csc.exe
69->89
started
192
Loading BitLocker PowerShell
Module
77->192
194
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
81->194
196
Writes or reads registry
keys via WMI
81->196
102
C:\Users\user\AppData\Local\Temp\RJRzX.zip, RAR
87->102
dropped
signatures21
process22
file23
112
C:\Users\user\AppData\Local\...\hg0ieary.dll, PE32
89->112
dropped
92
cvtres.exe
89->92
started
process24
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.