General

  • Target

    Krampus V1.0.3.exe

  • Size

    7.6MB

  • Sample

    240417-yyxbqadb45

  • MD5

    8720aba46da0b8648491f6d074647618

  • SHA1

    ab1e7f51c8dd4e686d498a394c184339fefc10cc

  • SHA256

    67346337782fbd66c3b5f77e9a873a5078f5936625848ebee8b592c715daf7f3

  • SHA512

    095596fcfdca3f9141c13e41a39ed0e59486d1d3824b14de6639af6ed32e634ef0fad6f4d50fc5a184059d5897d440e86a082d9b944b7b01a9a6bdbde9f066ac

  • SSDEEP

    196608:NMt+dnIdHWxdKHoYOeXRihlWu8YgoPIM:NMt+uoxmomX8hlzgOIM

Malware Config

Extracted

Family

xworm

C2

north-untitled.gl.at.ply.gg:29298

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    discord.exe

Targets

    • Target

      Krampus V1.0.3.exe

    • Size

      7.6MB

    • MD5

      8720aba46da0b8648491f6d074647618

    • SHA1

      ab1e7f51c8dd4e686d498a394c184339fefc10cc

    • SHA256

      67346337782fbd66c3b5f77e9a873a5078f5936625848ebee8b592c715daf7f3

    • SHA512

      095596fcfdca3f9141c13e41a39ed0e59486d1d3824b14de6639af6ed32e634ef0fad6f4d50fc5a184059d5897d440e86a082d9b944b7b01a9a6bdbde9f066ac

    • SSDEEP

      196608:NMt+dnIdHWxdKHoYOeXRihlWu8YgoPIM:NMt+uoxmomX8hlzgOIM

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks