General
-
Target
7чит.exe
-
Size
35KB
-
Sample
240805-d9lzxazdpa
-
MD5
c72cf3322b70dadb2eabfcdb7ecd9816
-
SHA1
ebc7fda12492d1c6b81d140b704933040c641be6
-
SHA256
2ba67cb3b309ecc5faf5705af16304b30a835c851aa59b1a05cb969c56e8b35f
-
SHA512
36aa399d640218d3f69c6298cff3ca1ae129748dd0cb2411f61e863417bfa70aaa7ddfc40204c0831afccccc5089f9408a6274b557fd557283629ee2e0fa7a5c
-
SSDEEP
768:AAcLODKXA3+jEwCSjN82KJRAxFk9AI6RO/hzbGK:AVLIzT0wRqFk9AI6RO/JaK
Behavioral task
behavioral1
Sample
7чит.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
5.0
master-accused.gl.at.ply.gg:53160
tqjmUOGVXtXXs6TJ
-
Install_directory
%AppData%
-
install_file
Runtime Broker.exe
Targets
-
-
Target
7чит.exe
-
Size
35KB
-
MD5
c72cf3322b70dadb2eabfcdb7ecd9816
-
SHA1
ebc7fda12492d1c6b81d140b704933040c641be6
-
SHA256
2ba67cb3b309ecc5faf5705af16304b30a835c851aa59b1a05cb969c56e8b35f
-
SHA512
36aa399d640218d3f69c6298cff3ca1ae129748dd0cb2411f61e863417bfa70aaa7ddfc40204c0831afccccc5089f9408a6274b557fd557283629ee2e0fa7a5c
-
SSDEEP
768:AAcLODKXA3+jEwCSjN82KJRAxFk9AI6RO/hzbGK:AVLIzT0wRqFk9AI6RO/JaK
-
Detect Xworm Payload
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1