General
-
Target
CLModdingTool.exe
-
Size
2.8MB
-
Sample
240514-mfb3aabg3s
-
MD5
3e8467e2688b2efa61f59f22f809f1e0
-
SHA1
a6c5df599e482932d3beda04c8ec6280fe6d68e8
-
SHA256
eb18e1c355e002f0589621dd7f67605004874c016ac7e3f3ea93ee0092a183ff
-
SHA512
43c252147ac8e63ad28d672ef866608af523e73991093d650b61a40c55b7415208bc472d29e6e8c650ca580b0b71ff35af0e4945d387e242878a114ea84883d5
-
SSDEEP
49152:9svNXfFAw+qqIlu3Ab7AUziVj3djevc2FmpLAcyxEDIUqsfix5b4qPcxxKppk:9sdfmZIllvYj3djeUHhaESV5b4qPIKLk
Static task
static1
Behavioral task
behavioral1
Sample
CLModdingTool.exe
Resource
win7-20231129-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1239664839861731431/VT6K0qlAVUjcvrSdaA7o80cVaJyetsfS1bh1v1T-yNWgA-Xp45pD3IwxPT8-ZVpBj_mb
Extracted
xworm
5.0
central-feb.gl.at.ply.gg:50764
v9noCapeVzXu1P4f
-
Install_directory
%AppData%
-
install_file
ModsInstaller.exe
Targets
-
-
Target
CLModdingTool.exe
-
Size
2.8MB
-
MD5
3e8467e2688b2efa61f59f22f809f1e0
-
SHA1
a6c5df599e482932d3beda04c8ec6280fe6d68e8
-
SHA256
eb18e1c355e002f0589621dd7f67605004874c016ac7e3f3ea93ee0092a183ff
-
SHA512
43c252147ac8e63ad28d672ef866608af523e73991093d650b61a40c55b7415208bc472d29e6e8c650ca580b0b71ff35af0e4945d387e242878a114ea84883d5
-
SSDEEP
49152:9svNXfFAw+qqIlu3Ab7AUziVj3djevc2FmpLAcyxEDIUqsfix5b4qPcxxKppk:9sdfmZIllvYj3djeUHhaESV5b4qPIKLk
-
Detect Xworm Payload
-
Modifies security service
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3