General

  • Target

    EAX.exe

  • Size

    1.6MB

  • Sample

    240801-z7q2qswgjq

  • MD5

    87461190cbbd2eb848b79b51181b743e

  • SHA1

    6731e220d3bf6d1b798ca53634cfa27a8635282c

  • SHA256

    f5423a76c3e4f5521fc2b20049e0c969cf98a68a47a460bc121835f3232ebc42

  • SHA512

    7a8f8e3baceca70a93b4003976a64ee0bdcf55a6e5c8ecd453fbb74c4e18cedbf312d6b3db13d41c7d1bfc5e64c181aa9648e991093ff7a4d438b1297c9e8bde

  • SSDEEP

    49152:oFxz9RXsYonyrEHBTlVD9EITaSgM+8ncGAV:oQYoHBTlVD9naSsscGA

Malware Config

Extracted

Family

xworm

Version

5.0

C2

edition-eat.gl.at.ply.gg:13576

Mutex

5HJZFucWFdqrEGtt

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      EAX.exe

    • Size

      1.6MB

    • MD5

      87461190cbbd2eb848b79b51181b743e

    • SHA1

      6731e220d3bf6d1b798ca53634cfa27a8635282c

    • SHA256

      f5423a76c3e4f5521fc2b20049e0c969cf98a68a47a460bc121835f3232ebc42

    • SHA512

      7a8f8e3baceca70a93b4003976a64ee0bdcf55a6e5c8ecd453fbb74c4e18cedbf312d6b3db13d41c7d1bfc5e64c181aa9648e991093ff7a4d438b1297c9e8bde

    • SSDEEP

      49152:oFxz9RXsYonyrEHBTlVD9EITaSgM+8ncGAV:oQYoHBTlVD9naSsscGA

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect Xworm Payload

    • Modifies security service

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • AgentTesla payload

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks