General

  • Target

    Nexus Release.rar

  • Size

    20.1MB

  • Sample

    240614-v1l2zstdpn

  • MD5

    ab3c1fd848d5570a40bb17a8d7b2107a

  • SHA1

    351090de4d1200f7d53810fd4534ba56372a21f3

  • SHA256

    b895ad7a2e10bc61670d50322612490e99a66cfd95a7a005a7ce5662617083f5

  • SHA512

    03c38e025af6b195e26a78f203e60b6c059c34508af93c545aa06bbc8fe1fbd87afc6d50246d799c9459a322134241d46a7c4915d74e318a2f01cc64069f7b32

  • SSDEEP

    393216:nezoWhX6DGw9q7AMeMW5wnfctGqovafOdPG9EZP/0CPa0o7rPKsZ4GsVwD:ezhXFw9q7feMWsfEcmOo9acga0CrPgJs

Malware Config

Extracted

Family

xworm

C2

91.92.241.69:5555

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Windows Runtime.exe

Targets

    • Target

      Nexus Release/ByfronHook.dll

    • Size

      21KB

    • MD5

      4e3e92823caeac1203beaa5a35d6dafc

    • SHA1

      893b591d46c39e817052cd05ec969fea74da4233

    • SHA256

      3811858da4b1f5e7f40d1237d7189ddca3989fa0d7b07e87c538f92975b893d2

    • SHA512

      0490e800f1e5c9b38b6c9b56616290f3a7214179e6d993214e3dd742d44d1d669fe5073b5a121c588c05f3e7c0ec576798236ee94e1a9b37e1d980d1969c9d33

    • SSDEEP

      384:pPLl4JbDL8XQZW8LN/4pvuBUyHVz0Ad29DtSLKZR2CF/9+8ADu/TyZdEPLe:pPh4yQZW8LNuAUyJl29DtSLKZR2m9+8m

    Score
    1/10
    • Target

      Nexus Release/Nexus Release V1.7.exe

    • Size

      20.1MB

    • MD5

      253575deb2d3ea6f88d960bdd4199170

    • SHA1

      7e0ecd244840472324d4ebec097c50983ddaec0d

    • SHA256

      14a8a060706a3a20704260d43910fb96a7f727d399b08f946cc9a2db1875ee6e

    • SHA512

      5833a87198ba997110f293a251394870035f247ba3aea4af6782ce5e1ae4dd5e8e163ccb53713435fe5b9e832bba5d23b3261b9e07a73e60bcd5bf622bd782e4

    • SSDEEP

      393216:yuxL64bjP10Io0Yl/fsQ1s3dKHg8rYT3mH8Ac7wzli5fxslEe8OqF0EaVr5tye:RxPvW70YltWf8MT2HvcMzlcpsme8OqFO

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

    • Target

      Nexus Release/assets.dll

    • Size

      171KB

    • MD5

      bcc0b07de0a24f9701fc97d154ecd660

    • SHA1

      cb5ba3b790cee940b4d18ff78e5a6cd71bdad47d

    • SHA256

      672cb16128dea50e21fd2d98889e2d6a2264b654304a3f4248ebdf4c546f734a

    • SHA512

      18959767986401bc877d30416e550c55e97c158f674b8f76dc9af117494e65e11d6000521f72be93c193ebd38f84d1b9578386c24911fda97507277f06ebd8e4

    • SSDEEP

      3072:rN505WN505WN505WN505WN505WN505WN505WN505WN505m:rNJNJNJNJNJNJNJNJNB

    Score
    1/10

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

System Services

2
T1569

Service Execution

2
T1569.002

Scheduled Task/Job

1
T1053

Persistence

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Impair Defenses

1
T1562

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Impact

Service Stop

1
T1489

Tasks