General

  • Target

    6f4697ceaa48de87c8463be064a41834.bin

  • Size

    2.6MB

  • Sample

    240729-ddvbeatemh

  • MD5

    af057a4eb6cd12e7907ad0b3ffa9b8d7

  • SHA1

    e3bc942393ff2a9794af32ed0f8dc041bc66cfd1

  • SHA256

    b4e03cc639324c26c224a11ee6e16295d2c996a47c4200ebbe299e3fb67e929c

  • SHA512

    8a067f900c63528e364d6113a56adb2d856ca569014694b6e696d7d9afdc7b7bc9551951f24dcd29627f617c559ac63ac9de4c821e2672ba9bede44b18a7704b

  • SSDEEP

    49152:mXyuHz5b6pajgh0lzGB0/gijy64/xKLVcnqZV5KNalD67lPns+F8wC:g1J6paj7QP88yB9gI8UiC

Malware Config

Extracted

Family

xworm

C2

main-although.gl.at.ply.gg:30970

article-coal.gl.at.ply.gg:27263

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

  • telegram

    https://api.telegram.org/bot7208700451:AAHHz5xWybJ91pH6F9vJRw8dcMEBlRiBXKs/sendMessage?chat_id=6131620354

Targets

    • Target

      098a170344a4ca7efe3e0c8b48c25a64fe0570b68eb0f3032c229e81597c1fbc.exe

    • Size

      2.6MB

    • MD5

      6f4697ceaa48de87c8463be064a41834

    • SHA1

      129b599295e013389255c16126ae64afd42c9cb4

    • SHA256

      098a170344a4ca7efe3e0c8b48c25a64fe0570b68eb0f3032c229e81597c1fbc

    • SHA512

      b9ff325866976ab0270224f3b512c45b8c5442fb58eff0b883fdf54babfa4845f95eb01d7c6f73d73e08fd59fd0c21d039bd75c318bb30e843c2bef861267c40

    • SSDEEP

      49152:lQQovM4NUTzrWlUMtHE772hZD9gtGIOSzAYpk8xKFxNWMjZuW:lgM4NOYt0iK8IOScYpP8WcD

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks