General

  • Target

    Krampus V1.0.4.exe

  • Size

    7.4MB

  • Sample

    240418-yz1qjaeh8v

  • MD5

    9cf96ea02d842bd21b1b36369cfe21cd

  • SHA1

    ffa7cd5689ffbe68ef28655f5a1568d3aec68141

  • SHA256

    49a99b879ee536694b0384a06d5535a292828eea2309399d43b62f85e1feff23

  • SHA512

    96aea5fa0105472285b8e51d007ca4b80cca60eaf47701c298c13474d643ad2c279a4d08cc1ff97e9470fe07d1af8a01778611f1b4f8bf428b9c3ab7254a7697

  • SSDEEP

    98304:3Sc0SbSMt+dnz8JjHWxJHRLIHzcrmpliRYOeTjcIJ1IlhlWu8hK87N7Ceg6H09Bi:6Mt+dnIdHWxdKHoYOeXRihlWu8YgoPS

Malware Config

Extracted

Family

xworm

C2

country-depend.gl.at.ply.gg:38853

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    discord.exe

Targets

    • Target

      Krampus V1.0.4.exe

    • Size

      7.4MB

    • MD5

      9cf96ea02d842bd21b1b36369cfe21cd

    • SHA1

      ffa7cd5689ffbe68ef28655f5a1568d3aec68141

    • SHA256

      49a99b879ee536694b0384a06d5535a292828eea2309399d43b62f85e1feff23

    • SHA512

      96aea5fa0105472285b8e51d007ca4b80cca60eaf47701c298c13474d643ad2c279a4d08cc1ff97e9470fe07d1af8a01778611f1b4f8bf428b9c3ab7254a7697

    • SSDEEP

      98304:3Sc0SbSMt+dnz8JjHWxJHRLIHzcrmpliRYOeTjcIJ1IlhlWu8hK87N7Ceg6H09Bi:6Mt+dnIdHWxdKHoYOeXRihlWu8YgoPS

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks