Resubmissions

05-02-2024 14:35

240205-rxzxwscadj 7

05-02-2024 13:41

240205-qzfrcshae6 1

05-02-2024 13:40

240205-qyt8cshad4 1

05-02-2024 13:32

240205-qte8msahen 1

05-02-2024 13:32

240205-qtc4aaghc7 1

05-02-2024 13:32

240205-qs85bsghc4 7

05-02-2024 08:48

240205-kqkfaseagn 1

04-02-2024 14:42

240204-r22x2secek 1

04-02-2024 14:15

240204-rkxxrsbeg2 7

03-02-2024 17:40

240203-v8625ahbhq 8

General

  • Target

    https://www.google.com/

  • Sample

    240203-s56k3scgg6

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1200869817268318268/VkwQErIaGPnWQEvPjkAK4PvbIZIBxr-bBUS4ZTB-1k6PYydi2Ici-C1MKt0aQWuycWVQ

Extracted

Family

xworm

Version

5.0

C2

links-tourism.gl.at.ply.gg:44001

Mutex

ts5PpBMQbT5ywes4

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      https://www.google.com/

    • 44Caliber

      An open source infostealer written in C#.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks