General
-
Target
Release.zip
-
Size
83KB
-
Sample
240808-c1jbzssclf
-
MD5
69b1b9dc3f4895d23f2ad606793ba22b
-
SHA1
371153ef608929c6b6163abc27fa2bfb152ee15d
-
SHA256
a95e3e88ecb9875925d4fc8598d48eb228cf763993662d0766bdc78948737f38
-
SHA512
5acad387d737039cc1e2d261ad4cbf095833b2756e096f33f12c3b55818c1de5ac13b5ad96f4b776760e634b9cf8f6daa43924b1986bde7ea246e330bac3e67a
-
SSDEEP
1536:zhZqSPCcRYTljbYNiUDbxSBjl0X60S99L6fmt2TAMQeTVNy+Jgcp9QbtQ+254:SSaFbPQFol0KDo1vNFJJp9954
Static task
static1
Behavioral task
behavioral1
Sample
Release/DwmLutGUI.exe
Resource
win11-20240802-en
Malware Config
Extracted
xworm
5.0
la-michael.gl.at.ply.gg:65463
641UIwoUJK0Mht9q
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
Release/DwmLutGUI.exe
-
Size
48KB
-
MD5
940026092c35c84f5de3369dbec24576
-
SHA1
679ec6ca51d3e47dfac2a1cdbe3b0b153be1b2b6
-
SHA256
4ac8778ddb796a771072f22cce6bba6fe36bcd7f10b66379ccc6c40fe7ff0a2b
-
SHA512
40a8893e3ebceb30d3f73eee5d5b6de8a2cff76387ec04955327b834bd487d0b3d7f9bcd251266a9b6aff634a527f3c1a089dc034836cd9d4df8d3918e9eb94c
-
SSDEEP
768:O/FOFRvMtpRGM7pnXm1V0q5nCI2CH8kSiJVDDDDDxVDDDDDsytYcFwVc6K:8E2XHq5nCI2K8kSiUewVcl
-
Detect Xworm Payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Sets service image path in registry
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Browser Extensions
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
6Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Discovery
Browser Information Discovery
1Network Service Discovery
1Network Share Discovery
1Peripheral Device Discovery
1Process Discovery
1Query Registry
6System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1