General
-
Target
b98ba4f48ad58a55a79732eea1f80838bc26dc0ab3ba0403d04a3c25df9c3d08.exe
-
Size
2.3MB
-
Sample
240407-bp32ksha3x
-
MD5
8392650851d29f54e051d8a6499889a5
-
SHA1
d5814cff46164e3011bfce0d3bd7f6692ec63c64
-
SHA256
b98ba4f48ad58a55a79732eea1f80838bc26dc0ab3ba0403d04a3c25df9c3d08
-
SHA512
f518039b485bc675383c11b435f2b6eab2dd8d1ffac3e0aed29d972effedeb69aa039191b0986a05c275a9ccb2d65d0efc98a21db96c9cde2c54a8fa3f0f1cd8
-
SSDEEP
49152:4EWDvY84YWarHKnuQDuZu/RJJlB8xsDDckz8YKBg1i1IIMoq:OxkDumRJJlQuDcXMDJ
Static task
static1
Behavioral task
behavioral1
Sample
b98ba4f48ad58a55a79732eea1f80838bc26dc0ab3ba0403d04a3c25df9c3d08.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b98ba4f48ad58a55a79732eea1f80838bc26dc0ab3ba0403d04a3c25df9c3d08.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
xworm
3.1
gamemodz.duckdns.org:4678
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
b98ba4f48ad58a55a79732eea1f80838bc26dc0ab3ba0403d04a3c25df9c3d08.exe
-
Size
2.3MB
-
MD5
8392650851d29f54e051d8a6499889a5
-
SHA1
d5814cff46164e3011bfce0d3bd7f6692ec63c64
-
SHA256
b98ba4f48ad58a55a79732eea1f80838bc26dc0ab3ba0403d04a3c25df9c3d08
-
SHA512
f518039b485bc675383c11b435f2b6eab2dd8d1ffac3e0aed29d972effedeb69aa039191b0986a05c275a9ccb2d65d0efc98a21db96c9cde2c54a8fa3f0f1cd8
-
SSDEEP
49152:4EWDvY84YWarHKnuQDuZu/RJJlB8xsDDckz8YKBg1i1IIMoq:OxkDumRJJlQuDcXMDJ
-
Chaos Ransomware
-
Detect Xworm Payload
-
Detect ZGRat V1
-
Detects Windows executables referencing non-Windows User-Agents
-
Detects command variations typically used by ransomware
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1