General
-
Target
kdmapper.exe
-
Size
213KB
-
Sample
240527-j1msqsdc7s
-
MD5
8b0bec71c0c9bfb67fc51cfeca662758
-
SHA1
aac11a7bcc44ac97f609375271d60b47d09764b6
-
SHA256
8b20f47382ac9fb608e568787d9d2974a3c3716bf56ba0208ef5599b19db4a1c
-
SHA512
0e62b0c72caccdc35307bf9175c101ac3b1076f918db54605bad71097104befff8d818977401ed808bfc8b1abc56c8c5af243bc9fdc51ee4e8b50fb1bfbb25b8
-
SSDEEP
6144:tTsNwAJb5JrD89A32tvPHilDRfc8t0hVkPn:tAN9JFJrD89akvm9f5OVk
Static task
static1
Behavioral task
behavioral1
Sample
kdmapper.exe
Resource
win7-20240221-en
Malware Config
Extracted
xworm
45.88.90.228:7000
178.215.236.228:7000
-
Install_directory
%ProgramData%
-
install_file
RtkAudUService64.exe
Targets
-
-
Target
kdmapper.exe
-
Size
213KB
-
MD5
8b0bec71c0c9bfb67fc51cfeca662758
-
SHA1
aac11a7bcc44ac97f609375271d60b47d09764b6
-
SHA256
8b20f47382ac9fb608e568787d9d2974a3c3716bf56ba0208ef5599b19db4a1c
-
SHA512
0e62b0c72caccdc35307bf9175c101ac3b1076f918db54605bad71097104befff8d818977401ed808bfc8b1abc56c8c5af243bc9fdc51ee4e8b50fb1bfbb25b8
-
SSDEEP
6144:tTsNwAJb5JrD89A32tvPHilDRfc8t0hVkPn:tAN9JFJrD89akvm9f5OVk
-
Detect Neshta payload
-
Detect Xworm Payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1