General

  • Target

    Celestial.exe

  • Size

    297KB

  • Sample

    240809-zwrtwsygjj

  • MD5

    9b650b738d97c0e39717fe86401a6726

  • SHA1

    34f361ab5024ad4390a3906cb3fff5a7b5f7e656

  • SHA256

    e94a439b85ca5bc7d19dda9a6ea43d921c385f99dedf8b6a6560cb747e43e264

  • SHA512

    a6664916c5c1bfd66e58face5c1811f95b6489c3e1d4728d4efee92233192fb145c8f0cca46582d560356b92732a8727794a7d8765d16c4df567eb5eb84b1e30

  • SSDEEP

    6144:Ka4InuJg58BkgqPoDH49n8Bb/cQ/gW/tQtbgk3KlRWvWl/HrrACG7:Kat0EAH49n8BLgSZQKXW+l/HnACs

Malware Config

Extracted

Family

xworm

C2

engineering-thoroughly.gl.at.ply.gg:32901

20.ip.gl.ply.gg:32901

Attributes
  • install_file

    USB.exe

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7268785583:AAFvSoXRrVhV7krjc8W8iUc9VL5ZyOqftLY/sendMessage?chat_id=https://t.me/ratnichektg_bot

Targets

    • Target

      Celestial.exe

    • Size

      297KB

    • MD5

      9b650b738d97c0e39717fe86401a6726

    • SHA1

      34f361ab5024ad4390a3906cb3fff5a7b5f7e656

    • SHA256

      e94a439b85ca5bc7d19dda9a6ea43d921c385f99dedf8b6a6560cb747e43e264

    • SHA512

      a6664916c5c1bfd66e58face5c1811f95b6489c3e1d4728d4efee92233192fb145c8f0cca46582d560356b92732a8727794a7d8765d16c4df567eb5eb84b1e30

    • SSDEEP

      6144:Ka4InuJg58BkgqPoDH49n8Bb/cQ/gW/tQtbgk3KlRWvWl/HrrACG7:Kat0EAH49n8BLgSZQKXW+l/HnACs

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Gurcu, WhiteSnake

      Gurcu is a malware stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks