Overview
overview
10Static
static
3Tango Rele....4.exe
windows7-x64
10Tango Rele....4.exe
windows10-2004-x64
10Tango Rele...ts.dll
windows7-x64
1Tango Rele...ts.dll
windows10-2004-x64
1Tango Rele...ns.txt
windows7-x64
1Tango Rele...ns.txt
windows10-2004-x64
1Tango Rele...se.txt
windows7-x64
1Tango Rele...se.txt
windows10-2004-x64
1General
-
Target
Tango Release.rar
-
Size
59.8MB
-
Sample
240607-14nmwaed26
-
MD5
cd308fa39380f2b5335f2a3d8e3349e5
-
SHA1
5d4ed367a1e5fa9c3b51f64a468f371db10b9c1c
-
SHA256
9ff074f53a4f69d30b5f5f8852fc026349a69d3588b42218edf12c96a6000e62
-
SHA512
bd802ac0d93aabee3739ed1ceef5d4fb572ef6aa9585c755f8db37dbc2a931d8006dab8920529ba0659e18c21bae59929ddc790ef3585fa41f97a616669211b8
-
SSDEEP
786432:n2Pk0MOE2Q4764pZ5rf3uyV2bfU61PsrVeDModLAeDoLJQOL8BIAmpnfUT7NnfeC:n2ZMOv7fuvb+AdLA6KRLjAf5fcvS2SR
Static task
static1
Behavioral task
behavioral1
Sample
Tango Release/Tango Release V1.4.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Tango Release/Tango Release V1.4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Tango Release/assets.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
Tango Release/assets.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Tango Release/instructions.txt
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
Tango Release/instructions.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Tango Release/license.txt
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Tango Release/license.txt
Resource
win10v2004-20240508-en
Malware Config
Extracted
xworm
91.92.241.69:5555
-
Install_directory
%ProgramData%
-
install_file
Windows Runtime.exe
Targets
-
-
Target
Tango Release/Tango Release V1.4.exe
-
Size
60.3MB
-
MD5
4e7be8f8af00c2badd0aecaa9164a088
-
SHA1
63ce85ee62895b8b0f42b03f1fe05dca1017d8e2
-
SHA256
38caeabef38c9b02db8cfcd79c62421ea00f653c20b4e3453ece38828891887f
-
SHA512
2d9d3c8d48727da86548732ec168d1c32ea1680633493674dad6d676a60324bb1e624d31b472737378adf0a01b4dd07cb3fdfb47b81e1df81c29d3a0972aa7b3
-
SSDEEP
1572864:9V8Km0TjSpfZ79y2toCqztuExv57AhRFxZA:9GKnjSJDLibtuEd57UPZ
-
Detect Xworm Payload
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
Tango Release/assets.dll
-
Size
171KB
-
MD5
bcc0b07de0a24f9701fc97d154ecd660
-
SHA1
cb5ba3b790cee940b4d18ff78e5a6cd71bdad47d
-
SHA256
672cb16128dea50e21fd2d98889e2d6a2264b654304a3f4248ebdf4c546f734a
-
SHA512
18959767986401bc877d30416e550c55e97c158f674b8f76dc9af117494e65e11d6000521f72be93c193ebd38f84d1b9578386c24911fda97507277f06ebd8e4
-
SSDEEP
3072:rN505WN505WN505WN505WN505WN505WN505WN505WN505m:rNJNJNJNJNJNJNJNJNB
Score1/10 -
-
-
Target
Tango Release/instructions.txt
-
Size
302B
-
MD5
b91989cc1085782007877cacd4a1dd42
-
SHA1
9e6e7edd14410a6c0159250cc8150baaa579d923
-
SHA256
f37680ea78e81fe9ba0403671c8080e3209161fb8918af09cc5bc46606569b48
-
SHA512
6eb13a3d88474f5e2a44b95e9e1f88233dc11d500533e56cc3d13914339669ace9c347ca0a2421d551188dc868b6e646b52668c32b50e4dca404c12287d0a7ae
Score1/10 -
-
-
Target
Tango Release/license.txt
-
Size
6KB
-
MD5
0b09566254b011d989decf0e23a902eb
-
SHA1
3ae5cd6be73daf418b8deee9c865cf78225838c9
-
SHA256
a19d58aaab15c4d0019e569d1c073d1b5286fdd37dbeee7a58a7d1ae76045ae1
-
SHA512
4e22e58f925879306261e5993039e1d84d87f8fecc0f9fdad534da55b6fd22be77e622a4077d8d521f7734e5535f66853d581155987e2f3607e2d386938c218b
-
SSDEEP
192:uEwjuKsgA4+XYdXjA+okS63vZBCSUziJm:eNs8+QRVxBRU1
Score1/10 -
MITRE ATT&CK Matrix ATT&CK v13
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Scheduled Task/Job
1Persistence
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1