Resubmissions
29-07-2024 08:54
240729-ktxvssvcpc 10General
-
Target
Loader.exe
-
Size
7.6MB
-
Sample
240729-ktxvssvcpc
-
MD5
aa16f3774491b600121545a5f194cefc
-
SHA1
c872fe765ecff1dada8378ad8a12cd5cf0425219
-
SHA256
c0a2b824a0fd05854818bfb81b02bc6178db3f8519807b15d844580099428e1d
-
SHA512
8b50e7c6eca25ecc2196fbfaf42079873e3c532a90e8d8b691fb594da3e067593f86f0d6488d0c314a27d78519f33fcbfb4532f811997891d55a47d582e1b3a8
-
SSDEEP
196608:8G46NbTO5uFqiXBIaqVCbB9+FsdH6HBiE555x:8G46N3O5uciXBvq09+wC/Hr
Static task
static1
Malware Config
Extracted
xworm
147.185.221.16:60401
-
Install_directory
%LocalAppData%
-
install_file
svchost.exe
Extracted
44caliber
https://discord.com/api/webhooks/1267250103538810911/_8BMipnmgDV4n-Uu_YmzeHrxrFFQPSAoBBDlwlDVhsDsk_31uQMADxZw-pq563wCO5KV
Targets
-
-
Target
Loader.exe
-
Size
7.6MB
-
MD5
aa16f3774491b600121545a5f194cefc
-
SHA1
c872fe765ecff1dada8378ad8a12cd5cf0425219
-
SHA256
c0a2b824a0fd05854818bfb81b02bc6178db3f8519807b15d844580099428e1d
-
SHA512
8b50e7c6eca25ecc2196fbfaf42079873e3c532a90e8d8b691fb594da3e067593f86f0d6488d0c314a27d78519f33fcbfb4532f811997891d55a47d582e1b3a8
-
SSDEEP
196608:8G46NbTO5uFqiXBIaqVCbB9+FsdH6HBiE555x:8G46N3O5uciXBvq09+wC/Hr
-
Detect Xworm Payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-