Resubmissions

05-02-2024 14:35

240205-rxzxwscadj 7

05-02-2024 13:41

240205-qzfrcshae6 1

05-02-2024 13:40

240205-qyt8cshad4 1

05-02-2024 13:32

240205-qte8msahen 1

05-02-2024 13:32

240205-qtc4aaghc7 1

05-02-2024 13:32

240205-qs85bsghc4 7

05-02-2024 08:48

240205-kqkfaseagn 1

04-02-2024 14:42

240204-r22x2secek 1

04-02-2024 14:15

240204-rkxxrsbeg2 7

03-02-2024 17:40

240203-v8625ahbhq 8

General

  • Target

    https://www.google.com/

  • Sample

    240203-s56k3scgg6

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1200869817268318268/VkwQErIaGPnWQEvPjkAK4PvbIZIBxr-bBUS4ZTB-1k6PYydi2Ici-C1MKt0aQWuycWVQ

Extracted

Family

xworm

Version

5.0

C2

links-tourism.gl.at.ply.gg:44001

Mutex

ts5PpBMQbT5ywes4

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      https://www.google.com/

    • 44Caliber

      An open source infostealer written in C#.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

3
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

3
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Modify Registry

3
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

6
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks