General

  • Target

    XWorm_5.7_Edition_Cracked.rar

  • Size

    30.6MB

  • Sample

    240318-3qf2zsce7s

  • MD5

    19bd3c412cb106ee5a0b69d014163115

  • SHA1

    9930f03b8de46e90666408fcacdf49a99407a7c0

  • SHA256

    2c839d033e5add685c2e993e032331ad96895d7b221cf2c05e9d74959079eb69

  • SHA512

    448b434f0e3119707755e70c45f6470e25e89aa9738d60a64c9efdd6ba48c82fa77660e0b005d3a030c6c1e23cb928e0918c011fcfb38b7e52d6e8c4771ec2dd

  • SSDEEP

    786432:rHKCyls5gf+p2FO2AfvwQEA1E9vbFSxWxcH2s1:rHLgGYtUvwQ69jFSxWgF

Score
7/10

Malware Config

Targets

    • Target

      XWorm_5.7_Edition_Cracked.rar

    • Size

      30.6MB

    • MD5

      19bd3c412cb106ee5a0b69d014163115

    • SHA1

      9930f03b8de46e90666408fcacdf49a99407a7c0

    • SHA256

      2c839d033e5add685c2e993e032331ad96895d7b221cf2c05e9d74959079eb69

    • SHA512

      448b434f0e3119707755e70c45f6470e25e89aa9738d60a64c9efdd6ba48c82fa77660e0b005d3a030c6c1e23cb928e0918c011fcfb38b7e52d6e8c4771ec2dd

    • SSDEEP

      786432:rHKCyls5gf+p2FO2AfvwQEA1E9vbFSxWxcH2s1:rHLgGYtUvwQ69jFSxWgF

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks