General

  • Target

    Svhost2.exe

  • Size

    36.2MB

  • Sample

    240808-ec9v5ssgpe

  • MD5

    60a9e5320e3fe7aefbff72bca88ccbf0

  • SHA1

    65af43eb84c187d834d1e0113f1aa7f0b82fcadd

  • SHA256

    8da2637a9b0a05e0f4658527e1571bb18b14a3ba6934658150d796d85d032480

  • SHA512

    04581124c8bae3ce7a3bef059d3296ac7d7b994af501de0ab29b94094dd5683df500914676d13204f29cd61eef8bcdb36f149f582fddd890d33cd014ba96c359

  • SSDEEP

    393216:31Du8BtuBw2FEL3Z3aLUoQvo6LP/SgbSpYvKEh1EdKwlGQKPJuGsiTfREsrgCYft:3Mguj8Q4VfvsqFTrYH

Malware Config

Extracted

Family

xworm

C2

147.185.221.21:57819

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot6863578083:AAGRiPUfgfiDpbqzNp6a_eWtUpxWtlGT2AA/sendMessage?chat_id=6237826260

Extracted

Family

gurcu

C2

https://api.telegram.org/bot6863578083:AAGRiPUfgfiDpbqzNp6a_eWtUpxWtlGT2AA/sendMessage?chat_id=6237826260

Targets

    • Target

      Svhost2.exe

    • Size

      36.2MB

    • MD5

      60a9e5320e3fe7aefbff72bca88ccbf0

    • SHA1

      65af43eb84c187d834d1e0113f1aa7f0b82fcadd

    • SHA256

      8da2637a9b0a05e0f4658527e1571bb18b14a3ba6934658150d796d85d032480

    • SHA512

      04581124c8bae3ce7a3bef059d3296ac7d7b994af501de0ab29b94094dd5683df500914676d13204f29cd61eef8bcdb36f149f582fddd890d33cd014ba96c359

    • SSDEEP

      393216:31Du8BtuBw2FEL3Z3aLUoQvo6LP/SgbSpYvKEh1EdKwlGQKPJuGsiTfREsrgCYft:3Mguj8Q4VfvsqFTrYH

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Gurcu, WhiteSnake

      Gurcu is a malware stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks