General

  • Target

    _43234355_Contract_of_Sale_pdf.hta

  • Size

    840B

  • Sample

    230327-xcaedsgg9x

  • MD5

    6a8c611062057298887c83ccfe702a15

  • SHA1

    8c3023a178c326d9da94273f6dfe62c73ca07f96

  • SHA256

    27c34ef5f274515bb252b5e52c009260764918de9b44ef8a1eb549f221f66075

  • SHA512

    c562f01f83fbc88f2b4f1177ebcba5ee1a1b752ab7ff94f910d064a4f6d012872496b2082f1bd1d8446b4c5e166bc6e7cdc35c98220742703ee4e30878896133

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://ggdt.xyz/windows/Windows.txt

exe.dropper

https://ggdt.xyz/windows/Windows.txt

Extracted

Family

xworm

C2

property-gourmet.at.ply.gg:51618

Mutex

Xf5kvWS6zqGxig4q

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      _43234355_Contract_of_Sale_pdf.hta

    • Size

      840B

    • MD5

      6a8c611062057298887c83ccfe702a15

    • SHA1

      8c3023a178c326d9da94273f6dfe62c73ca07f96

    • SHA256

      27c34ef5f274515bb252b5e52c009260764918de9b44ef8a1eb549f221f66075

    • SHA512

      c562f01f83fbc88f2b4f1177ebcba5ee1a1b752ab7ff94f910d064a4f6d012872496b2082f1bd1d8446b4c5e166bc6e7cdc35c98220742703ee4e30878896133

    • XenArmor Suite

      XenArmor is as suite of password recovery tools for various application.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

4
T1081

Discovery

System Information Discovery

3
T1082

Query Registry

3
T1012

Collection

Data from Local System

4
T1005

Email Collection

1
T1114

Tasks