General

  • Target

    Nursultan Beta.exe

  • Size

    1.4MB

  • Sample

    240503-v6e6maeh25

  • MD5

    4349595847eeffb2ce68e023f50051e6

  • SHA1

    3d7d3bf311ec3805ce8f1f723dbf5773fd91654a

  • SHA256

    211cb177c61f63ca15955c9c3cfb44104f0551714801adc550911b038c2bf368

  • SHA512

    a00a478aa7c7233ce45970dc181aa67ce5fce530abad7ce2f3ff68541bcfa8b86e7bfafc4d12b374281b9b3de939c4e97d3098a7113be1e0a99369f2514a9650

  • SSDEEP

    24576:vcdzJ9uJisjax+yQC5AYni5e7/tIlX80ouT8wel/VUwg8i:vszJCRQD1n4e71IlKuNo/VUw6

Malware Config

Extracted

Family

xworm

C2

lesbian-organ.gl.at.ply.gg:38343

Attributes
  • Install_directory

    %Temp%

  • install_file

    Nursultan Beta.exe

Targets

    • Target

      Nursultan Beta.exe

    • Size

      1.4MB

    • MD5

      4349595847eeffb2ce68e023f50051e6

    • SHA1

      3d7d3bf311ec3805ce8f1f723dbf5773fd91654a

    • SHA256

      211cb177c61f63ca15955c9c3cfb44104f0551714801adc550911b038c2bf368

    • SHA512

      a00a478aa7c7233ce45970dc181aa67ce5fce530abad7ce2f3ff68541bcfa8b86e7bfafc4d12b374281b9b3de939c4e97d3098a7113be1e0a99369f2514a9650

    • SSDEEP

      24576:vcdzJ9uJisjax+yQC5AYni5e7/tIlX80ouT8wel/VUwg8i:vszJCRQD1n4e71IlKuNo/VUw6

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • XenArmor Suite

      XenArmor is as suite of password recovery tools for various application.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks