General
-
Target
Krampus V1.0.4.exe
-
Size
7.4MB
-
Sample
240418-yz1qjaeh8v
-
MD5
9cf96ea02d842bd21b1b36369cfe21cd
-
SHA1
ffa7cd5689ffbe68ef28655f5a1568d3aec68141
-
SHA256
49a99b879ee536694b0384a06d5535a292828eea2309399d43b62f85e1feff23
-
SHA512
96aea5fa0105472285b8e51d007ca4b80cca60eaf47701c298c13474d643ad2c279a4d08cc1ff97e9470fe07d1af8a01778611f1b4f8bf428b9c3ab7254a7697
-
SSDEEP
98304:3Sc0SbSMt+dnz8JjHWxJHRLIHzcrmpliRYOeTjcIJ1IlhlWu8hK87N7Ceg6H09Bi:6Mt+dnIdHWxdKHoYOeXRihlWu8YgoPS
Static task
static1
Malware Config
Extracted
xworm
country-depend.gl.at.ply.gg:38853
-
Install_directory
%Userprofile%
-
install_file
discord.exe
Targets
-
-
Target
Krampus V1.0.4.exe
-
Size
7.4MB
-
MD5
9cf96ea02d842bd21b1b36369cfe21cd
-
SHA1
ffa7cd5689ffbe68ef28655f5a1568d3aec68141
-
SHA256
49a99b879ee536694b0384a06d5535a292828eea2309399d43b62f85e1feff23
-
SHA512
96aea5fa0105472285b8e51d007ca4b80cca60eaf47701c298c13474d643ad2c279a4d08cc1ff97e9470fe07d1af8a01778611f1b4f8bf428b9c3ab7254a7697
-
SSDEEP
98304:3Sc0SbSMt+dnz8JjHWxJHRLIHzcrmpliRYOeTjcIJ1IlhlWu8hK87N7Ceg6H09Bi:6Mt+dnIdHWxdKHoYOeXRihlWu8YgoPS
-
Detect Xworm Payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1