General
-
Target
TrinityV2.exe
-
Size
516KB
-
Sample
240608-mxb4lsah8x
-
MD5
78b76867f6fc4770ed720616230292ba
-
SHA1
a6e2cdae0dc8f8ad070ee1b28337036a457e45a2
-
SHA256
97f2e56dc51fe8d315b213597e35d5b2f5cbeb8d71c6adfe7a0b9d28c3c9dac9
-
SHA512
99ccd96909f3f31d6fd06150f206c72be4d33389b3f6786c2ae3869d0e9eb19a031522b9220fb3651e283d30afd930d79acb9d68b1f21e2860e5f0859a4aa55c
-
SSDEEP
1536:UBLUVVU+Gwi0VzRDWcQjK1/41D0jv0VzRDWcQjK1/41D0jrCtVcl:VrDFJ41D0jMrDFJ41D0jrC/Y
Static task
static1
Behavioral task
behavioral1
Sample
TrinityV2.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
xworm
5.0
19.ip.gl.ply.gg:32712
Pzty25hnZjK5ZOPd
-
Install_directory
%AppData%
-
install_file
Users.exe
Targets
-
-
Target
TrinityV2.exe
-
Size
516KB
-
MD5
78b76867f6fc4770ed720616230292ba
-
SHA1
a6e2cdae0dc8f8ad070ee1b28337036a457e45a2
-
SHA256
97f2e56dc51fe8d315b213597e35d5b2f5cbeb8d71c6adfe7a0b9d28c3c9dac9
-
SHA512
99ccd96909f3f31d6fd06150f206c72be4d33389b3f6786c2ae3869d0e9eb19a031522b9220fb3651e283d30afd930d79acb9d68b1f21e2860e5f0859a4aa55c
-
SSDEEP
1536:UBLUVVU+Gwi0VzRDWcQjK1/41D0jv0VzRDWcQjK1/41D0jrCtVcl:VrDFJ41D0jMrDFJ41D0jrC/Y
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-