General

  • Target

    lunarium.exe

  • Size

    150KB

  • Sample

    240524-kaak6abb36

  • MD5

    d5c26e12be6264033efd9e5e0662a953

  • SHA1

    e4570cecc53e5e916c06e38c62221f27af7a1225

  • SHA256

    28c951715ea1f1e20db6e2694c8b9676837190d4ff1c49c6c9f7cb41b899a91b

  • SHA512

    adbb48ebda59c9b804ddaf4561a0679436987d6deef883d632f0eeb30adbc9c812f09eeefbbaef013f3139a5b6e3665af276a283c5ef73031861b49d01136b55

  • SSDEEP

    3072:Ahd295oBFr9DnO/nk4NpVq8BxFRzaqF+o2GQJ7/JzqVfGvM:AaLonr9jgVqwlL

Malware Config

Extracted

Family

xworm

Version

5.0

C2

p-never.gl.at.ply.gg:57388

Mutex

EKx5toUcZoEkFlZt

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

aes.plain

Targets

    • Target

      lunarium.exe

    • Size

      150KB

    • MD5

      d5c26e12be6264033efd9e5e0662a953

    • SHA1

      e4570cecc53e5e916c06e38c62221f27af7a1225

    • SHA256

      28c951715ea1f1e20db6e2694c8b9676837190d4ff1c49c6c9f7cb41b899a91b

    • SHA512

      adbb48ebda59c9b804ddaf4561a0679436987d6deef883d632f0eeb30adbc9c812f09eeefbbaef013f3139a5b6e3665af276a283c5ef73031861b49d01136b55

    • SSDEEP

      3072:Ahd295oBFr9DnO/nk4NpVq8BxFRzaqF+o2GQJ7/JzqVfGvM:AaLonr9jgVqwlL

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks