General
-
Target
Sercher.exe
-
Size
69KB
-
Sample
240725-vsyqtawhpe
-
MD5
a67e7d9cf57f128c6cd5915e2ffb135d
-
SHA1
acbcaa10a0349ba69f6a57db1302a6ae588f67d6
-
SHA256
64398384e4d50c9419134ae4ad66d01f20a4172198af10222130b6bf1a6b3747
-
SHA512
6349f21426ac05f50cbb3ab0dea5b6e2a7c97faa31d295f8d666a9733605918d8c4430993d0a056c8972c516ed78ec0002022af2ed5c9ed927c30be822e040d2
-
SSDEEP
1536:yaP+F1aMEWqEYFOHOqsHbDyGi3md+66hbArKOl37gohqm:3GOiXsTbDoJhArKO97gowm
Behavioral task
behavioral1
Sample
Sercher.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Sercher.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
xworm
127.0.0.1:16512
no-loss.gl.at.ply.gg:16512
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
Sercher.exe
-
Size
69KB
-
MD5
a67e7d9cf57f128c6cd5915e2ffb135d
-
SHA1
acbcaa10a0349ba69f6a57db1302a6ae588f67d6
-
SHA256
64398384e4d50c9419134ae4ad66d01f20a4172198af10222130b6bf1a6b3747
-
SHA512
6349f21426ac05f50cbb3ab0dea5b6e2a7c97faa31d295f8d666a9733605918d8c4430993d0a056c8972c516ed78ec0002022af2ed5c9ed927c30be822e040d2
-
SSDEEP
1536:yaP+F1aMEWqEYFOHOqsHbDyGi3md+66hbArKOl37gohqm:3GOiXsTbDoJhArKO97gowm
-
Detect Xworm Payload
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1