Resubmissions

05-11-2023 15:00

231105-sdsvxahf57 10

05-11-2023 14:58

231105-sb9qmsfg2v 7

General

  • Target

    danger.siski

  • Size

    17.3MB

  • Sample

    231105-sdsvxahf57

  • MD5

    7aff5c8e1a98cda8d462565511a5bc2d

  • SHA1

    4703377360e523fae14e0c09aa1a05af040ccc91

  • SHA256

    a90ca15d3c601ae18f82601cfa311ff92405877087ff5566b365799ba05466eb

  • SHA512

    bbbc8ccbc6a2fcea0949c4a27ac935310c4b6c8175521c4db0753c0e440c8d9eb58c99996f0bb5d42e02bbd4c6b4f21530abe43add04d58e89f35471f1db909f

  • SSDEEP

    393216:7eYCTfyWo1HwlNwakK/Aze071Sxs9PHPN4s+Fhh1:bCDyWEHs3kv7Iy9Pe/

Malware Config

Extracted

Family

xworm

Version

3.1

C2

216.230.73.215:6789

Mutex

JhB3xwmTJqR9i5Pu

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    SyncHost.exe

  • telegram

    https://api.telegram.org/bot6051093382:AAFB_OlEEXCr5NVu4fhuf3m_RPUHXO-LxuA/sendMessage?chat_id=1876538826

aes.plain

Targets

    • Target

      danger.siski

    • Size

      17.3MB

    • MD5

      7aff5c8e1a98cda8d462565511a5bc2d

    • SHA1

      4703377360e523fae14e0c09aa1a05af040ccc91

    • SHA256

      a90ca15d3c601ae18f82601cfa311ff92405877087ff5566b365799ba05466eb

    • SHA512

      bbbc8ccbc6a2fcea0949c4a27ac935310c4b6c8175521c4db0753c0e440c8d9eb58c99996f0bb5d42e02bbd4c6b4f21530abe43add04d58e89f35471f1db909f

    • SSDEEP

      393216:7eYCTfyWo1HwlNwakK/Aze071Sxs9PHPN4s+Fhh1:bCDyWEHs3kv7Iy9Pe/

    • Detect Xworm Payload

    • Luca Stealer

      Info stealer written in Rust first seen in July 2022.

    • Luca Stealer payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Tasks