General
-
Target
itsme.exe
-
Size
231KB
-
Sample
240723-119qyavbqe
-
MD5
f2f94444de88eb15899bac1496d588b6
-
SHA1
f325369f4f20ab22256983d3e712e2dab231ae0f
-
SHA256
09e3694ca05efd4f0a91f3e4ff2569e3fd06c68105fa76990dc38125c745be0a
-
SHA512
67bc23811817fab189ac25706eee34debc73647a9b7407bece9a6cbf103970d2192d009197e3c450533474d8da64bfc2991c72df0182a14d0a76fdd8090427de
-
SSDEEP
6144:IrFRVUS82CAiVYcgIRYHYhvtug68eOcmk1:IrFQFmYbuGc
Static task
static1
Malware Config
Extracted
xworm
3.0
increased-wage.gl.at.ply.gg:9707
XvYKEJ5veEhlOGBW
-
install_file
USB.exe
Targets
-
-
Target
itsme.exe
-
Size
231KB
-
MD5
f2f94444de88eb15899bac1496d588b6
-
SHA1
f325369f4f20ab22256983d3e712e2dab231ae0f
-
SHA256
09e3694ca05efd4f0a91f3e4ff2569e3fd06c68105fa76990dc38125c745be0a
-
SHA512
67bc23811817fab189ac25706eee34debc73647a9b7407bece9a6cbf103970d2192d009197e3c450533474d8da64bfc2991c72df0182a14d0a76fdd8090427de
-
SSDEEP
6144:IrFRVUS82CAiVYcgIRYHYhvtug68eOcmk1:IrFQFmYbuGc
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1