General

  • Target

    WaveInstaller.exe

  • Size

    76KB

  • Sample

    240713-2mty1aseqa

  • MD5

    1b95a7fc10c0b54c7d807d1f7ee2b778

  • SHA1

    75d3a2f1d104b8f4950f59da9e829d61943e3e44

  • SHA256

    d2373e86e03b935c7c24993f2a567a7e9f3b477c460a4c061da4000de493fbd8

  • SHA512

    b225f9052457b5de3728f1f2bf5cf17905de780823ccaa0139e0f559212a05bb177297d950783084cae87f4da217c94d8ad66124f0a3c6946bd5662a43395d4e

  • SSDEEP

    1536:kpn26tWBE8jMMx4yBmEbTb1XyM6lk120w6hO2GRKVJjiS:kpn2FMniTb1IH0w6hOFRKnr

Malware Config

Extracted

Family

xworm

C2

email-champions.gl.at.ply.gg:50458

Attributes
  • Install_directory

    %Temp%

  • install_file

    svchost.exe

  • telegram

    https://api.telegram.org/bot6814850214:AAGtrnkhUh3vMq-wH7W5cvNuSWLdcy7mtis/sendMessage?chat_id=7094837950

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7777

Mutex

OpzaMu4iTgsJXCov

Attributes
  • install_file

    USB.exe

aes.plain
1
ErGiQbb0cw+nfoCszE/zGg==
aes.plain
1
RTjQ3AXhk2Xg1SSOAeBPlQ==

Extracted

Family

gurcu

C2

https://api.telegram.org/bot6814850214:AAGtrnkhUh3vMq-wH7W5cvNuSWLdcy7mtis/sendMessage?chat_id=7094837950

Targets

    • Target

      WaveInstaller.exe

    • Size

      76KB

    • MD5

      1b95a7fc10c0b54c7d807d1f7ee2b778

    • SHA1

      75d3a2f1d104b8f4950f59da9e829d61943e3e44

    • SHA256

      d2373e86e03b935c7c24993f2a567a7e9f3b477c460a4c061da4000de493fbd8

    • SHA512

      b225f9052457b5de3728f1f2bf5cf17905de780823ccaa0139e0f559212a05bb177297d950783084cae87f4da217c94d8ad66124f0a3c6946bd5662a43395d4e

    • SSDEEP

      1536:kpn26tWBE8jMMx4yBmEbTb1XyM6lk120w6hO2GRKVJjiS:kpn2FMniTb1IH0w6hOFRKnr

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Gurcu, WhiteSnake

      Gurcu is a malware stealer written in C#.

    • UAC bypass

    • Xworm

      Xworm is a remote access trojan written in C#.

    • AgentTesla payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.