General
-
Target
fart worm.rar
-
Size
22.7MB
-
Sample
240725-wvabnswcml
-
MD5
630e09943078d4b853c4d2298bd141ba
-
SHA1
5b8a3522db39e09bc4daf36b420ee5671e6dd941
-
SHA256
fc2c1679e7d3b6abb01b8c38dec3f16d56d173940a06181244330aa0bc30ab4c
-
SHA512
fc591a3104e2aa8533762d2d27881ed5517a67fb8915c162b49ebac2653bde51c379725a96883edc056293696c73188580cc7963b4af5ba50bb4e315ce1d498e
-
SSDEEP
393216:uAPLtj+wSrV5LLmx9KZlGlDAzkG7N2mZ8GeVnBmdRqBXsXG6kik5l1aGEWvPBqeC:uum5R5zkG7/OGe6dReXN6CuGpvC
Static task
static1
Behavioral task
behavioral1
Sample
WizWorm V5/WizWorm V5.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
WizWorm V5/WizWorm V5.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
WizWorm V5/WizWorm V5.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
asyncrat
WeedRAT
Default
true-baghdad.gl.at.ply.gg:61202
xInKFBCkbzDz
-
delay
3
-
install
true
-
install_file
wzcdetect.exe
-
install_folder
%AppData%
Extracted
umbral
https://discord.com/api/webhooks/1249878996729200650/D6Sae4N0q4Tdhi6fxln2bXNVm1jQNdpHYtnipXyc04dBJs5Jp2LSJWfIMCi0Hs66R2-7
Extracted
https://github.com/eq44/d/raw/main/wzcstatus.exe
https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat
Extracted
xworm
3.1
true-baghdad.gl.at.ply.gg:61202
Z0m98pC7RpsdD0uc
-
install_file
USB.exe
Targets
-
-
Target
WizWorm V5/WizWorm V5.exe
-
Size
21.3MB
-
MD5
c831f8de57e6bc935d531d95999b7364
-
SHA1
a85f7c7946e458cf1ba64a233b3932cc314c9cad
-
SHA256
e1559165017c04cebc3d56bbb9cc7f5b7b18e520f2eec6f77484496e204a92ca
-
SHA512
1429f4700398b62d70dd51233d95b79aebc0e5a04aa31fea7304cee7b3f7723cd4f8d451945b088615f0f3f77777dfc3e4b8615ce51c42c247a9f392fe46749d
-
SSDEEP
393216:uSrV5LLmx9KZlGlDAzkG7N2mZ8GeVnBmdRqBXsXG6kik5l1aGEWvPBqeh3:B5R5zkG7/OGe6dReXN6CuGpv
-
Detect Umbral payload
-
Detect Xworm Payload
-
Async RAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
3PowerShell
3Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1