General
-
Target
Krampus V1.0.3.exe
-
Size
7.6MB
-
Sample
240417-yyxbqadb45
-
MD5
8720aba46da0b8648491f6d074647618
-
SHA1
ab1e7f51c8dd4e686d498a394c184339fefc10cc
-
SHA256
67346337782fbd66c3b5f77e9a873a5078f5936625848ebee8b592c715daf7f3
-
SHA512
095596fcfdca3f9141c13e41a39ed0e59486d1d3824b14de6639af6ed32e634ef0fad6f4d50fc5a184059d5897d440e86a082d9b944b7b01a9a6bdbde9f066ac
-
SSDEEP
196608:NMt+dnIdHWxdKHoYOeXRihlWu8YgoPIM:NMt+uoxmomX8hlzgOIM
Static task
static1
Behavioral task
behavioral1
Sample
Krampus V1.0.3.exe
Resource
win7-20240221-en
Malware Config
Extracted
xworm
north-untitled.gl.at.ply.gg:29298
-
Install_directory
%Userprofile%
-
install_file
discord.exe
Targets
-
-
Target
Krampus V1.0.3.exe
-
Size
7.6MB
-
MD5
8720aba46da0b8648491f6d074647618
-
SHA1
ab1e7f51c8dd4e686d498a394c184339fefc10cc
-
SHA256
67346337782fbd66c3b5f77e9a873a5078f5936625848ebee8b592c715daf7f3
-
SHA512
095596fcfdca3f9141c13e41a39ed0e59486d1d3824b14de6639af6ed32e634ef0fad6f4d50fc5a184059d5897d440e86a082d9b944b7b01a9a6bdbde9f066ac
-
SSDEEP
196608:NMt+dnIdHWxdKHoYOeXRihlWu8YgoPIM:NMt+uoxmomX8hlzgOIM
-
Detect Xworm Payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1