General
-
Target
Setup.exe
-
Size
136KB
-
Sample
240529-fj5ensba9s
-
MD5
2490778321cefd83508ba9786b66c217
-
SHA1
aa968d4fed3451a2fff03208e2815a5f342db167
-
SHA256
989c54ab290e147aba6de1e542eb71cdbc50179dffc190ca46031ce8f18a6c8b
-
SHA512
b5f46764e5d4ddb9eeb783f96356eabc9c5590abf36ee4554fd3bf1118220a9d24d78ef8d1187fa69505b0dc857606c81d2ce852ae74a59a883742ad551e5553
-
SSDEEP
3072:cpOFIFK9WFOM3Bz65/M6If+3Js+3JFkKeTni:co0K9YxBt25
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:65129
0.tcp.eu.ngrok.io:18780:65129
0.tcp.eu.ngrok.io:65129
kitchen-minds.gl.at.ply.gg:65129
Xr8BqboocnOuliE1
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
Setup.exe
-
Size
136KB
-
MD5
2490778321cefd83508ba9786b66c217
-
SHA1
aa968d4fed3451a2fff03208e2815a5f342db167
-
SHA256
989c54ab290e147aba6de1e542eb71cdbc50179dffc190ca46031ce8f18a6c8b
-
SHA512
b5f46764e5d4ddb9eeb783f96356eabc9c5590abf36ee4554fd3bf1118220a9d24d78ef8d1187fa69505b0dc857606c81d2ce852ae74a59a883742ad551e5553
-
SSDEEP
3072:cpOFIFK9WFOM3Bz65/M6If+3Js+3JFkKeTni:co0K9YxBt25
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Neshta payload
-
Detect Xworm Payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
StormKitty payload
-
Disables RegEdit via registry modification
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1