General
-
Target
obfuscation.exe
-
Size
9.1MB
-
Sample
240711-nxtjbsvekm
-
MD5
2ae868b168beb1deb65d20f874bce159
-
SHA1
9a46809b44bcef9991434e8e15e3c1f2457e99bb
-
SHA256
7e6af40b57f5bbcd748800a280c4d246b4a57b364b02fa17a912408e717f047e
-
SHA512
8c883e738c2ea0db42d66c55f6edd50bd9b894d8ebd856669e99284f380c14bf99d748f52ca9cc7583ee55f06432a27c2fa54c500a7c688e10ab9516d2181bef
-
SSDEEP
196608:nMhkTeaA1HeT39IigQWc0/aHeM1F9m0gJ2u:MqTw1+TtIiLm/Y29
Malware Config
Extracted
xworm
logo-active.gl.at.ply.gg:25835
0x9d2c646775BAa45D051289fE9b2c1AacD26A43A0:1
-
Install_directory
%LocalAppData%
-
install_file
msedge.exe
-
telegram
https://api.telegram.org/bot6763574008:AAHEXR4ypdI308urgV3J-jyMocsw7X8318Q
Extracted
gurcu
https://api.telegram.org/bot6763574008:AAHEXR4ypdI308urgV3J-jyMocsw7X8318Q/sendMessage?chat_id=tgratbot
Targets
-
-
Target
obfuscation.exe
-
Size
9.1MB
-
MD5
2ae868b168beb1deb65d20f874bce159
-
SHA1
9a46809b44bcef9991434e8e15e3c1f2457e99bb
-
SHA256
7e6af40b57f5bbcd748800a280c4d246b4a57b364b02fa17a912408e717f047e
-
SHA512
8c883e738c2ea0db42d66c55f6edd50bd9b894d8ebd856669e99284f380c14bf99d748f52ca9cc7583ee55f06432a27c2fa54c500a7c688e10ab9516d2181bef
-
SSDEEP
196608:nMhkTeaA1HeT39IigQWc0/aHeM1F9m0gJ2u:MqTw1+TtIiLm/Y29
-
Detect Xworm Payload
-
XMRig Miner payload
-
Creates new service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1