General
-
Target
BED020CBBA2610B31AF66357DB97C10C.exe
-
Size
95KB
-
Sample
240807-gde39ssfjj
-
MD5
bed020cbba2610b31af66357db97c10c
-
SHA1
d4c68500e5f8125b60976af885172253a435cc78
-
SHA256
56d98688e5aa501787a31e98f9666b80002bb692e793257bb3a6f6f9cace8278
-
SHA512
08fb0c1fa421dbdd61aa57d2adc7127cf7def12e88db054515be18ec05207e6f93ad775316137267d77e987e0145439e293af4784eb9b17826d9cb39fdedd931
-
SSDEEP
1536:6GCx35SC0o7Yrcpv41Efir+XKEkRi/gN2ieJOW56+Cj5sVMH:6GO35SBrcpgSfPLkEybeJL56+CtYMH
Static task
static1
Behavioral task
behavioral1
Sample
BED020CBBA2610B31AF66357DB97C10C.exe
Resource
win7-20240704-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
103.174.191.71:6606
103.174.191.71:7707
103.174.191.71:8808
HFE2t0VQV50q
-
delay
3
-
install
false
-
install_file
game.exe
-
install_folder
%AppData%
Extracted
xworm
5.0
testarosa.duckdns.org:7110
103.174.191.71:15320
H1C6pa3caMCcJ1BG
-
Install_directory
%LocalAppData%
-
install_file
svchost.exe
Targets
-
-
Target
BED020CBBA2610B31AF66357DB97C10C.exe
-
Size
95KB
-
MD5
bed020cbba2610b31af66357db97c10c
-
SHA1
d4c68500e5f8125b60976af885172253a435cc78
-
SHA256
56d98688e5aa501787a31e98f9666b80002bb692e793257bb3a6f6f9cace8278
-
SHA512
08fb0c1fa421dbdd61aa57d2adc7127cf7def12e88db054515be18ec05207e6f93ad775316137267d77e987e0145439e293af4784eb9b17826d9cb39fdedd931
-
SSDEEP
1536:6GCx35SC0o7Yrcpv41Efir+XKEkRi/gN2ieJOW56+Cj5sVMH:6GO35SBrcpgSfPLkEybeJL56+CtYMH
-
Detect Xworm Payload
-
Async RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
2Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1