General
-
Target
Raay.exe
-
Size
77KB
-
Sample
240727-n8qa2syell
-
MD5
579bbb00df8d9c7b15a00ca98ec16d95
-
SHA1
9af40927d52ff537a711c99d3ccd11369450bd2c
-
SHA256
b2a2ea4888de39002cbed8d29113aa0fba930b627bc45db95c60279549213ee0
-
SHA512
2fd67fa5129c8b649ee3c36f0e3a4f3a0fe38db02a7ca9c2b4d9147054a188dd9fa1744c775e29ad23394f32209e0d63f61f1ea083155fa83e7bd2c6ffc25955
-
SSDEEP
1536:qtQAMecqXuVzSt8+3/+7RbFahy4+I7A6z3O67ohHad:NA0zSNmRbFWZ1O6kh6d
Behavioral task
behavioral1
Sample
Raay.exe
Resource
win10-20240404-en
Malware Config
Extracted
xworm
185.221.20.180:7000
-
Install_directory
%AppData%
-
install_file
RaayScriptsFiveM.exe
Targets
-
-
Target
Raay.exe
-
Size
77KB
-
MD5
579bbb00df8d9c7b15a00ca98ec16d95
-
SHA1
9af40927d52ff537a711c99d3ccd11369450bd2c
-
SHA256
b2a2ea4888de39002cbed8d29113aa0fba930b627bc45db95c60279549213ee0
-
SHA512
2fd67fa5129c8b649ee3c36f0e3a4f3a0fe38db02a7ca9c2b4d9147054a188dd9fa1744c775e29ad23394f32209e0d63f61f1ea083155fa83e7bd2c6ffc25955
-
SSDEEP
1536:qtQAMecqXuVzSt8+3/+7RbFahy4+I7A6z3O67ohHad:NA0zSNmRbFWZ1O6kh6d
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1