General

  • Target

    MLClauncher.exe

  • Size

    66KB

  • Sample

    240529-v2kwbaca5y

  • MD5

    23e7e5af720dfc90b86294a8a7800c76

  • SHA1

    e674bd73e3c9a496c9b5422f43874fcfc9f5510c

  • SHA256

    1810fc024d4da8c805bdf76c8152ec68615c33676c4bee025d889de89af3724f

  • SHA512

    0bb3731bfd6601b9b903ce93aa3fc493d063d5ddb20b7e2277808205bcde96f5cc7dafc94caf59ec5e7d0b8a44aa6b739cc6f326d29aaa03c3b85c090cab3681

  • SSDEEP

    1536:rttwy1I4PKiFM8tBb1L1JmX2npd6KnXOUVBCIu9BE:BBRPXb1L22pDXOUPCpBE

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:2832

20.ip.gl.ply.gg:2832

financial-merchandise.gl.at.ply.gg:64299

<Xwormmm>:1

Attributes
  • Install_directory

    %Temp%

  • install_file

    svhost.exe

Targets

    • Target

      MLClauncher.exe

    • Size

      66KB

    • MD5

      23e7e5af720dfc90b86294a8a7800c76

    • SHA1

      e674bd73e3c9a496c9b5422f43874fcfc9f5510c

    • SHA256

      1810fc024d4da8c805bdf76c8152ec68615c33676c4bee025d889de89af3724f

    • SHA512

      0bb3731bfd6601b9b903ce93aa3fc493d063d5ddb20b7e2277808205bcde96f5cc7dafc94caf59ec5e7d0b8a44aa6b739cc6f326d29aaa03c3b85c090cab3681

    • SSDEEP

      1536:rttwy1I4PKiFM8tBb1L1JmX2npd6KnXOUVBCIu9BE:BBRPXb1L22pDXOUPCpBE

    • Detect Xworm Payload

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • UAC bypass

    • Xworm

      Xworm is a remote access trojan written in C#.

    • ModiLoader Second Stage

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Modifies Installed Components in the registry

    • Sets file execution options in registry

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

3
T1547.001

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Scheduled Task/Job

1
T1053

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

3
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

5
T1112

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

5
T1012

System Information Discovery

6
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks