Resubmissions

10/07/2024, 16:46

240710-t9yayaycqq 10

10/07/2024, 16:43

240710-t8qvgayclm 10

General

  • Target

    SGClauncher.exe

  • Size

    1.3MB

  • Sample

    240710-t8qvgayclm

  • MD5

    a542ae7611ecaf8eb6e3262dfaa3276d

  • SHA1

    2621f70c313c963d4a91af799517944261071fb2

  • SHA256

    6d69df7f61f45924dfaa3a072d57ceb69e60eb49be9e5610a27dfc3ee557cc2a

  • SHA512

    dfd3ea4b7887a8067cd942376aa73a723e84e10688f72bd4ebe23fb46a0f002516f73e957c13e6f603f4b63dac09715eb556055aa5241d39859cd9a3f9f4f692

  • SSDEEP

    24576:lGKUQ8GaJaKx/Q+iRQLtWS8vFxJb/mKgVTWRM:lGJhx/cwWT9nm18M

Malware Config

Extracted

Family

xworm

C2

management-angle.gl.at.ply.gg:1309

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      SGClauncher.exe

    • Size

      1.3MB

    • MD5

      a542ae7611ecaf8eb6e3262dfaa3276d

    • SHA1

      2621f70c313c963d4a91af799517944261071fb2

    • SHA256

      6d69df7f61f45924dfaa3a072d57ceb69e60eb49be9e5610a27dfc3ee557cc2a

    • SHA512

      dfd3ea4b7887a8067cd942376aa73a723e84e10688f72bd4ebe23fb46a0f002516f73e957c13e6f603f4b63dac09715eb556055aa5241d39859cd9a3f9f4f692

    • SSDEEP

      24576:lGKUQ8GaJaKx/Q+iRQLtWS8vFxJb/mKgVTWRM:lGJhx/cwWT9nm18M

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks