General
-
Target
c4ee2ead2c1f1b2b5420280522acaee51469844c29807fd274e2d06f2044c410
-
Size
9.3MB
-
Sample
240526-cab5zsaf3w
-
MD5
5f566e46a2acc85e1dad153ac1ab7f19
-
SHA1
b1ba70b980793c7f6389d3779b34f4c51014308a
-
SHA256
c4ee2ead2c1f1b2b5420280522acaee51469844c29807fd274e2d06f2044c410
-
SHA512
57b35345bbcb5fd48cd46a5d0e0bd6fa0b5aa34c5964cd77b24f6b52be8dfe0586d35a995e02b3d97f6f3a0289d8241e1d424eae924a6002f389125c7ae27e7b
-
SSDEEP
196608:oBPYvqBtmaxkFfx79H4q/p4OtxdoVAx9GM2RptVof8VmYV3B0SFqx9KWNj:oBAyBtjxkF8I4OZo6x45ptqEcYV3W2CJ
Static task
static1
Behavioral task
behavioral1
Sample
c4ee2ead2c1f1b2b5420280522acaee51469844c29807fd274e2d06f2044c410.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c4ee2ead2c1f1b2b5420280522acaee51469844c29807fd274e2d06f2044c410.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
xworm
5.0
195.88.218.82:7000
rSju9dw9NiZbjmTZ
-
Install_directory
%AppData%
-
install_file
Apps.exe
-
telegram
https://api.telegram.org/bot7141327038:AAGOb6-3xjEjegc_pKm0d8BC48HietEz_wY
Targets
-
-
Target
c4ee2ead2c1f1b2b5420280522acaee51469844c29807fd274e2d06f2044c410
-
Size
9.3MB
-
MD5
5f566e46a2acc85e1dad153ac1ab7f19
-
SHA1
b1ba70b980793c7f6389d3779b34f4c51014308a
-
SHA256
c4ee2ead2c1f1b2b5420280522acaee51469844c29807fd274e2d06f2044c410
-
SHA512
57b35345bbcb5fd48cd46a5d0e0bd6fa0b5aa34c5964cd77b24f6b52be8dfe0586d35a995e02b3d97f6f3a0289d8241e1d424eae924a6002f389125c7ae27e7b
-
SSDEEP
196608:oBPYvqBtmaxkFfx79H4q/p4OtxdoVAx9GM2RptVof8VmYV3B0SFqx9KWNj:oBAyBtjxkF8I4OZo6x45ptqEcYV3W2CJ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Xworm Payload
-
StormKitty payload
-
AgentTesla payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1