General

  • Target

    x4Rootkit.exe

  • Size

    8.4MB

  • Sample

    240711-ywry8avaqb

  • MD5

    88243d0aa7a248e97e273ba0fca05d80

  • SHA1

    886898b2e794c3f32ceed3ef1bfd8bd8f1e003ba

  • SHA256

    0c98ffe995b53e4923f4401b8c45a3e459b0580fa2197bb69490708a539f074b

  • SHA512

    60984ee504ca3048d83e9d14b0a9fb0c39ddb6cae4397a8627aabda8a93ad5c361dabb684151077138b991df12cc0b1130899e386f815aa57f1cb2ddad145715

  • SSDEEP

    196608:JxN3xtkZcjp9Q2U+PYk3UriXbHbiIJmdUl7V9rKDl:PN3xSYUH4ariKIF7V8p

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:48802

those-situation.gl.at.ply.gg:48802

Attributes
  • Install_directory

    %AppData%

  • install_file

    x4host.exe

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Mr.Joex

C2

seems-radio.gl.at.ply.gg:2519

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    true

  • install_file

    Winhlp32.exe

  • install_folder

    %Temp%

aes.plain

Extracted

Family

xworm

Version

3.1

C2

seems-radio.gl.at.ply.gg:2519

Attributes
  • Install_directory

    %Temp%

  • install_file

    USB.exe

Targets

    • Target

      x4Rootkit.exe

    • Size

      8.4MB

    • MD5

      88243d0aa7a248e97e273ba0fca05d80

    • SHA1

      886898b2e794c3f32ceed3ef1bfd8bd8f1e003ba

    • SHA256

      0c98ffe995b53e4923f4401b8c45a3e459b0580fa2197bb69490708a539f074b

    • SHA512

      60984ee504ca3048d83e9d14b0a9fb0c39ddb6cae4397a8627aabda8a93ad5c361dabb684151077138b991df12cc0b1130899e386f815aa57f1cb2ddad145715

    • SSDEEP

      196608:JxN3xtkZcjp9Q2U+PYk3UriXbHbiIJmdUl7V9rKDl:PN3xSYUH4ariKIF7V8p

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Async RAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks