Post

XLMRat Writeup

XLMRat Writeup

XLMRat (AsyncRAT) — Network Forensics Writeup


Scenario

A compromised machine was flagged due to suspicious network traffic.
The objective of this analysis is to investigate the attack method, identify malicious payloads, and trace the timeline of events.
We focus on how the attacker gained access, the tools and techniques used, and the malware’s post-compromise behavior.


Q1) The attacker successfully executed a command to download the first stage of the malware.

What is the URL from which the first malware stage was installed?

Answer:

The malicious PowerShell command attempted to download from the server 45.126.209.4 on port 222, requesting the resource /mdm.jpg.
Although the extension was .jpg, the file actually contained an executable payload disguised as an image.
This is a common tactic used to bypass simple content filters.

PCAP Evidence

The attacker executed an obfuscated PowerShell command to download the first stage of the malware. Analysis of the initial script (xlm.txt) revealed the following download location: Malware Stage 1 URL: http://45.126.209.4:222/mdm.jpg

PCAP Evidence

PCAP Evidence

Q2) Which hosting provider owns the associated IP address?

Answer:

In this question he need the Associated Hosting Provider (ISP): [Reliablesite.net]

PCAP Evidence



Q3) By analyzing the malicious scripts, two payloads were identified: a loader and a secondary executable. What is the SHA256 of the malware executable?

Analysis of the downloaded file mdm.jpg revealed two payloads: a loader and a secondary executable.

PCAP Evidence

After deobfuscation and extraction of the executable files

PCAP Evidence

Answer:

The SHA256 hash of the extracted malware executable is:

1
1eb7b02e18f67420f42b1d94e74f3b6289d92672a0fb1786c30c03d68e81d798

This hash matches samples identified as AsyncRAT on public malware repositories.

PCAP Evidence



Q4) What is the malware family label based on Alibaba?

PCAP Evidence

Answer:

AsyncRat —

Q5 ) What is the timestamp of the malware’s creation?

Answer:

PCAP Evidence Ans: 2023-10-30 15:08


Q6 ) Which LOLBin is leveraged for stealthy process execution in this script? Provide the full path.

The attacker leveraged the RegSvcs.exe binary:

PCAP Evidence

Then After Replacing the hashtag it will be like this

PCAP Evidence

Answer:

1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe

This is a Living-off-the-Land Binary (LOLBIN) often abused to run malicious assemblies.
By relying on a signed Microsoft binary, the attacker attempted to evade process-based detection. —


Q7) The script is designed to drop several files. List the names of the files dropped by the script.

Answer:

The malware dropped several helper scripts to maintain execution:

PCAP Evidence The Files Are :

1
2
3
- Conted.ps1  
- Conted.bat  
- Conted.vbs  

These files were used to reinvoke PowerShell, execute the payload, and establish persistence across reboots. —


Summary of Findings

The sample belongs to the AsyncRAT family.

AsyncRAT is a Remote Access Trojan (RAT) that provides attackers with the ability to remotely control infected systems.
Its capabilities include keylogging, file transfer, remote shell execution, screen capture, and persistence mechanisms.
It is widely used due to its open-source availability and flexibility.

  • Initial Access: Obfuscated PowerShell command downloaded the first-stage payload (mdm.jpg) from http://45.126.209.4:222.
  • Payload Hash: 1eb7b02e18f67420f42b1d94e74f3b6289d92672a0fb1786c30c03d68e81d798.
  • Execution: Abused RegSvcs.exe (LOLBIN) for stealthy execution.
  • Dropped Files: Conted.ps1, Conted.bat, Conted.vbs.
  • C2 Server: 45.126.209.4:222.
  • Malware Family: AsyncRAT.

This analysis highlights how attackers use obfuscated PowerShell, disguised payloads, and LOLBIN abuse to establish and maintain control over compromised systems.
Documenting the infection chain and IOCs is essential for SOC teams to improve detection and response. —

This post is licensed under CC BY 4.0 by the author.