General

  • Target

    fart worm.rar

  • Size

    22.7MB

  • Sample

    240725-wvabnswcml

  • MD5

    630e09943078d4b853c4d2298bd141ba

  • SHA1

    5b8a3522db39e09bc4daf36b420ee5671e6dd941

  • SHA256

    fc2c1679e7d3b6abb01b8c38dec3f16d56d173940a06181244330aa0bc30ab4c

  • SHA512

    fc591a3104e2aa8533762d2d27881ed5517a67fb8915c162b49ebac2653bde51c379725a96883edc056293696c73188580cc7963b4af5ba50bb4e315ce1d498e

  • SSDEEP

    393216:uAPLtj+wSrV5LLmx9KZlGlDAzkG7N2mZ8GeVnBmdRqBXsXG6kik5l1aGEWvPBqeC:uum5R5zkG7/OGe6dReXN6CuGpvC

Malware Config

Extracted

Family

asyncrat

Version

WeedRAT

Botnet

Default

C2

true-baghdad.gl.at.ply.gg:61202

Mutex

xInKFBCkbzDz

Attributes
  • delay

    3

  • install

    true

  • install_file

    wzcdetect.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1249878996729200650/D6Sae4N0q4Tdhi6fxln2bXNVm1jQNdpHYtnipXyc04dBJs5Jp2LSJWfIMCi0Hs66R2-7

Extracted

Language
ps1
Source
URLs
exe.dropper

https://github.com/eq44/d/raw/main/wzcstatus.exe

exe.dropper

https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat

Extracted

Family

xworm

Version

3.1

C2

true-baghdad.gl.at.ply.gg:61202

Mutex

Z0m98pC7RpsdD0uc

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      WizWorm V5/WizWorm V5.exe

    • Size

      21.3MB

    • MD5

      c831f8de57e6bc935d531d95999b7364

    • SHA1

      a85f7c7946e458cf1ba64a233b3932cc314c9cad

    • SHA256

      e1559165017c04cebc3d56bbb9cc7f5b7b18e520f2eec6f77484496e204a92ca

    • SHA512

      1429f4700398b62d70dd51233d95b79aebc0e5a04aa31fea7304cee7b3f7723cd4f8d451945b088615f0f3f77777dfc3e4b8615ce51c42c247a9f392fe46749d

    • SSDEEP

      393216:uSrV5LLmx9KZlGlDAzkG7N2mZ8GeVnBmdRqBXsXG6kik5l1aGEWvPBqeh3:B5R5zkG7/OGe6dReXN6CuGpv

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Async RAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks