General

  • Target

    Qukp.exe

  • Size

    502KB

  • Sample

    230418-vqk2yaef7w

  • MD5

    2342a4200ef17e6fbc11a8a3fe7ba814

  • SHA1

    44589e5234f5f87c9aa05688ea985f952480995f

  • SHA256

    5b5b46c74c4a67f1076b4520768d1e80d8e9cf628a0e212470e863e562585ee3

  • SHA512

    3a64d471b51f839c5ebc2142d7c49981142d94dc89651327d579e32e4e9049020fdfdd304d9ab605bfcbbb4f400906ce2cd476ef53042202ad9430a12e3831a1

  • SSDEEP

    12288:ACUIfi7cYZZpc2PoUeHPdSEPxINNlzmYQ:lI4Yd7WSNNBm

Malware Config

Extracted

Family

xworm

C2

animals-sewing.at.ply.gg:41503

Attributes
  • install_file

    Windows.exe

Targets

    • Target

      Qukp.exe

    • Size

      502KB

    • MD5

      2342a4200ef17e6fbc11a8a3fe7ba814

    • SHA1

      44589e5234f5f87c9aa05688ea985f952480995f

    • SHA256

      5b5b46c74c4a67f1076b4520768d1e80d8e9cf628a0e212470e863e562585ee3

    • SHA512

      3a64d471b51f839c5ebc2142d7c49981142d94dc89651327d579e32e4e9049020fdfdd304d9ab605bfcbbb4f400906ce2cd476ef53042202ad9430a12e3831a1

    • SSDEEP

      12288:ACUIfi7cYZZpc2PoUeHPdSEPxINNlzmYQ:lI4Yd7WSNNBm

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Downloads MZ/PE file

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks