General
-
Target
EXM_Premium_Tweaking_Utility_1.0_Cracked.bat
-
Size
672KB
-
Sample
240721-p7p5bstdrp
-
MD5
33d64072e513e7945f6585d19a3ba998
-
SHA1
4b790623eb16328d8fb76adf4e32b43cbbaf85f8
-
SHA256
6057667756c5dbd4b66e7d856e1d045d3a05b8592cc689a7eb5a548cd0c1be4e
-
SHA512
761a0499955f2d207ff386282f7e955ab4eb3892039e73e77a92f560ed05ac267e301b55ff80bec108db502fa428154af582b7a6b456f0a9975c42d9ab98e0e5
-
SSDEEP
3072:ZUGzQbmbkAqA2xH7VkKEn14IZVvisLur+K3:ZUGiVNEn14IZVvisL43
Static task
static1
Behavioral task
behavioral1
Sample
EXM_Premium_Tweaking_Utility_1.0_Cracked.bat
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
EXM_Premium_Tweaking_Utility_1.0_Cracked.bat
Resource
win10v2004-20240709-en
Malware Config
Extracted
xworm
-
Install_directory
%LocalAppData%
-
install_file
svchost.exe
-
pastebin_url
https://pastebin.com/raw/ZnhxAV6a
-
telegram
https://api.telegram.org/bot6701075763:AAGkvv2CpqBxGihH8FtOkSA7Uxy35GZpAFI/sendMessage?chat_id=5991331733
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6701075763:AAGkvv2CpqBxGihH8FtOkSA7Uxy35GZpAFI/sendMessage?chat_id=5991331733
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
EXM_Premium_Tweaking_Utility_1.0_Cracked.bat
-
Size
672KB
-
MD5
33d64072e513e7945f6585d19a3ba998
-
SHA1
4b790623eb16328d8fb76adf4e32b43cbbaf85f8
-
SHA256
6057667756c5dbd4b66e7d856e1d045d3a05b8592cc689a7eb5a548cd0c1be4e
-
SHA512
761a0499955f2d207ff386282f7e955ab4eb3892039e73e77a92f560ed05ac267e301b55ff80bec108db502fa428154af582b7a6b456f0a9975c42d9ab98e0e5
-
SSDEEP
3072:ZUGzQbmbkAqA2xH7VkKEn14IZVvisLur+K3:ZUGiVNEn14IZVvisL43
-
Detect Xworm Payload
-
StormKitty payload
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2