General
-
Target
Nursultan Beta.exe
-
Size
1.4MB
-
Sample
240503-v6e6maeh25
-
MD5
4349595847eeffb2ce68e023f50051e6
-
SHA1
3d7d3bf311ec3805ce8f1f723dbf5773fd91654a
-
SHA256
211cb177c61f63ca15955c9c3cfb44104f0551714801adc550911b038c2bf368
-
SHA512
a00a478aa7c7233ce45970dc181aa67ce5fce530abad7ce2f3ff68541bcfa8b86e7bfafc4d12b374281b9b3de939c4e97d3098a7113be1e0a99369f2514a9650
-
SSDEEP
24576:vcdzJ9uJisjax+yQC5AYni5e7/tIlX80ouT8wel/VUwg8i:vszJCRQD1n4e71IlKuNo/VUw6
Static task
static1
Behavioral task
behavioral1
Sample
Nursultan Beta.exe
Resource
win11-20240419-en
Malware Config
Extracted
xworm
lesbian-organ.gl.at.ply.gg:38343
-
Install_directory
%Temp%
-
install_file
Nursultan Beta.exe
Targets
-
-
Target
Nursultan Beta.exe
-
Size
1.4MB
-
MD5
4349595847eeffb2ce68e023f50051e6
-
SHA1
3d7d3bf311ec3805ce8f1f723dbf5773fd91654a
-
SHA256
211cb177c61f63ca15955c9c3cfb44104f0551714801adc550911b038c2bf368
-
SHA512
a00a478aa7c7233ce45970dc181aa67ce5fce530abad7ce2f3ff68541bcfa8b86e7bfafc4d12b374281b9b3de939c4e97d3098a7113be1e0a99369f2514a9650
-
SSDEEP
24576:vcdzJ9uJisjax+yQC5AYni5e7/tIlX80ouT8wel/VUwg8i:vszJCRQD1n4e71IlKuNo/VUw6
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
StormKitty payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-