General

  • Target

    Ship Particular_WALER_INZUR GEMI.exe

  • Size

    1.7MB

  • Sample

    231012-g9lwpaec38

  • MD5

    119764b23b4ba1669e5e3a2f001d9974

  • SHA1

    d951b8ef60e3c11e0c90761fa0057aa3534df42c

  • SHA256

    e540958829005866e4ecd6e7f1cdf3b5c2f063717a746d4485ff0ed62ccf9e71

  • SHA512

    8c5bea8cbd88766da83d7c95bcaf3cc05b09c82def494bab1f779ffd9958d2459cd23d9ca98711386c8a4fef2ecbf4081dac62adced9a7ebda33643d1c10f175

  • SSDEEP

    49152:d8mdIHHlnWrxywK5/AXx1RPIf44B81jKn/VS5pXw6Qc:d8mdIHHlnWQJKyl+Fl5Qc

Malware Config

Targets

    • Target

      Ship Particular_WALER_INZUR GEMI.exe

    • Size

      1.7MB

    • MD5

      119764b23b4ba1669e5e3a2f001d9974

    • SHA1

      d951b8ef60e3c11e0c90761fa0057aa3534df42c

    • SHA256

      e540958829005866e4ecd6e7f1cdf3b5c2f063717a746d4485ff0ed62ccf9e71

    • SHA512

      8c5bea8cbd88766da83d7c95bcaf3cc05b09c82def494bab1f779ffd9958d2459cd23d9ca98711386c8a4fef2ecbf4081dac62adced9a7ebda33643d1c10f175

    • SSDEEP

      49152:d8mdIHHlnWrxywK5/AXx1RPIf44B81jKn/VS5pXw6Qc:d8mdIHHlnWQJKyl+Fl5Qc

    • Detect Xworm Payload

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks