General

  • Target

    Krampus.zip

  • Size

    15.4MB

  • Sample

    240527-fkmagsgh6v

  • MD5

    f2c4af070b935a1522b92d790ddee93c

  • SHA1

    f9bf33356a0f91b091d9f61e688af44b800f57a6

  • SHA256

    4a643c8ac145763b7e4a9b410a5dcc3562faf0f2204ec0d2613833923628f419

  • SHA512

    369f8c27db42569f6185499f792d7d01013cc1e48652f568dfde6cfdc3c6d4d40f390a1b62dda5adbaace33e3f9509a062bc0e08863f4704084fe7d33ea7778f

  • SSDEEP

    393216:Nkkk95qd0eLlm6DpdmjiPGn6asoNaAad25Aybi3R4Lh8lH:Nw9bmlmomv99aAg/yERoI

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/a1kmrNub

Targets

    • Target

      Krampus/Krampus/B1OdUv8CBH.exe

    • Size

      18.8MB

    • MD5

      c5df5afb4679cbea28de24ff9ed306a2

    • SHA1

      fe968a913c1377f0e85cc4c95afa3129a2f9ae22

    • SHA256

      a12756e652171e06da8133a7abe625316b3d352fc82ed8cf199f349b7de0c478

    • SHA512

      a4ddb32c744da55829823feb140c2c48612d442459ec76daf7ec0459327e8422222a380c53802c15b298cf122f1f86fe2891b2bf04732ef764d62fb182cd7e70

    • SSDEEP

      196608:EXi2sOT7HnJ+7CBgHcyCkaIH2kkoyhr5QXNDe6JaCPU8rblcRHrdcKZ5CRO2HACB:ci07we4+TB6zxJcRBdCrHxwwR

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      Krampus/Krampus/DefenderControl/Defender_Settings.vbs

    • Size

      313B

    • MD5

      b0bf0a477bcca312021177572311e666

    • SHA1

      ea77332d7779938ae8e92ad35d6dea4f4be37a92

    • SHA256

      af42a17d428c8e9d6f4a6d3393ec268f4d12bbfd01a897d87275482a45c847e9

    • SHA512

      09366608f2670d2eb0e8ddcacd081a7b2d7b680c4cdd02494d08821dbdf17595b30e88f6ce0888591592e7caa422414a895846a268fd63e8243074972c9f52d8

    Score
    3/10
    • Target

      Krampus/Krampus/DefenderControl/dControl.exe

    • Size

      447KB

    • MD5

      58008524a6473bdf86c1040a9a9e39c3

    • SHA1

      cb704d2e8df80fd3500a5b817966dc262d80ddb8

    • SHA256

      1ef6c1a4dfdc39b63bfe650ca81ab89510de6c0d3d7c608ac5be80033e559326

    • SHA512

      8cf492584303523bf6cdfeb6b1b779ee44471c91e759ce32fd4849547b6245d4ed86af5b38d1c6979729a77f312ba91c48207a332ae1589a6e25de67ffb96c31

    • SSDEEP

      6144:Vzv+kSn74iCmfianQGDM3OXTWRDy9GYQDUmJFXIXHrsUBnBTF8JJCYrYNsQJzfgu:Vzcn7EanlQiWtYhmJFSwUBLcQZfgiD

    Score
    7/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks