General
-
Target
6f4697ceaa48de87c8463be064a41834.bin
-
Size
2.6MB
-
Sample
240729-ddvbeatemh
-
MD5
af057a4eb6cd12e7907ad0b3ffa9b8d7
-
SHA1
e3bc942393ff2a9794af32ed0f8dc041bc66cfd1
-
SHA256
b4e03cc639324c26c224a11ee6e16295d2c996a47c4200ebbe299e3fb67e929c
-
SHA512
8a067f900c63528e364d6113a56adb2d856ca569014694b6e696d7d9afdc7b7bc9551951f24dcd29627f617c559ac63ac9de4c821e2672ba9bede44b18a7704b
-
SSDEEP
49152:mXyuHz5b6pajgh0lzGB0/gijy64/xKLVcnqZV5KNalD67lPns+F8wC:g1J6paj7QP88yB9gI8UiC
Static task
static1
Behavioral task
behavioral1
Sample
098a170344a4ca7efe3e0c8b48c25a64fe0570b68eb0f3032c229e81597c1fbc.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
098a170344a4ca7efe3e0c8b48c25a64fe0570b68eb0f3032c229e81597c1fbc.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
xworm
main-although.gl.at.ply.gg:30970
article-coal.gl.at.ply.gg:27263
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
telegram
https://api.telegram.org/bot7208700451:AAHHz5xWybJ91pH6F9vJRw8dcMEBlRiBXKs/sendMessage?chat_id=6131620354
Targets
-
-
Target
098a170344a4ca7efe3e0c8b48c25a64fe0570b68eb0f3032c229e81597c1fbc.exe
-
Size
2.6MB
-
MD5
6f4697ceaa48de87c8463be064a41834
-
SHA1
129b599295e013389255c16126ae64afd42c9cb4
-
SHA256
098a170344a4ca7efe3e0c8b48c25a64fe0570b68eb0f3032c229e81597c1fbc
-
SHA512
b9ff325866976ab0270224f3b512c45b8c5442fb58eff0b883fdf54babfa4845f95eb01d7c6f73d73e08fd59fd0c21d039bd75c318bb30e843c2bef861267c40
-
SSDEEP
49152:lQQovM4NUTzrWlUMtHE772hZD9gtGIOSzAYpk8xKFxNWMjZuW:lgM4NOYt0iK8IOScYpP8WcD
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1