General
-
Target
Krampus.zip
-
Size
15.4MB
-
Sample
240511-x52z4sde7w
-
MD5
f2c4af070b935a1522b92d790ddee93c
-
SHA1
f9bf33356a0f91b091d9f61e688af44b800f57a6
-
SHA256
4a643c8ac145763b7e4a9b410a5dcc3562faf0f2204ec0d2613833923628f419
-
SHA512
369f8c27db42569f6185499f792d7d01013cc1e48652f568dfde6cfdc3c6d4d40f390a1b62dda5adbaace33e3f9509a062bc0e08863f4704084fe7d33ea7778f
-
SSDEEP
393216:Nkkk95qd0eLlm6DpdmjiPGn6asoNaAad25Aybi3R4Lh8lH:Nw9bmlmomv99aAg/yERoI
Behavioral task
behavioral1
Sample
Krampus/Krampus/B1OdUv8CBH.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Krampus/Krampus/DefenderControl/Defender_Settings.vbs
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Krampus/Krampus/DefenderControl/dControl.exe
Resource
win10-20240404-en
Malware Config
Extracted
xworm
-
Install_directory
%ProgramData%
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/a1kmrNub
Targets
-
-
Target
Krampus/Krampus/B1OdUv8CBH.exe
-
Size
18.8MB
-
MD5
c5df5afb4679cbea28de24ff9ed306a2
-
SHA1
fe968a913c1377f0e85cc4c95afa3129a2f9ae22
-
SHA256
a12756e652171e06da8133a7abe625316b3d352fc82ed8cf199f349b7de0c478
-
SHA512
a4ddb32c744da55829823feb140c2c48612d442459ec76daf7ec0459327e8422222a380c53802c15b298cf122f1f86fe2891b2bf04732ef764d62fb182cd7e70
-
SSDEEP
196608:EXi2sOT7HnJ+7CBgHcyCkaIH2kkoyhr5QXNDe6JaCPU8rblcRHrdcKZ5CRO2HACB:ci07we4+TB6zxJcRBdCrHxwwR
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Krampus/Krampus/DefenderControl/Defender_Settings.vbs
-
Size
313B
-
MD5
b0bf0a477bcca312021177572311e666
-
SHA1
ea77332d7779938ae8e92ad35d6dea4f4be37a92
-
SHA256
af42a17d428c8e9d6f4a6d3393ec268f4d12bbfd01a897d87275482a45c847e9
-
SHA512
09366608f2670d2eb0e8ddcacd081a7b2d7b680c4cdd02494d08821dbdf17595b30e88f6ce0888591592e7caa422414a895846a268fd63e8243074972c9f52d8
Score3/10 -
-
-
Target
Krampus/Krampus/DefenderControl/dControl.exe
-
Size
447KB
-
MD5
58008524a6473bdf86c1040a9a9e39c3
-
SHA1
cb704d2e8df80fd3500a5b817966dc262d80ddb8
-
SHA256
1ef6c1a4dfdc39b63bfe650ca81ab89510de6c0d3d7c608ac5be80033e559326
-
SHA512
8cf492584303523bf6cdfeb6b1b779ee44471c91e759ce32fd4849547b6245d4ed86af5b38d1c6979729a77f312ba91c48207a332ae1589a6e25de67ffb96c31
-
SSDEEP
6144:Vzv+kSn74iCmfianQGDM3OXTWRDy9GYQDUmJFXIXHrsUBnBTF8JJCYrYNsQJzfgu:Vzcn7EanlQiWtYhmJFSwUBLcQZfgiD
Score7/10-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-