General
-
Target
PanelExecutorV11.exe_bound.exe
-
Size
196KB
-
Sample
240811-mmh46szepc
-
MD5
383c7f9f75adf2764857393fbf1f21e3
-
SHA1
cf6f36d1fe32d2e584c64cc191324385d6944766
-
SHA256
ee75d0a55a2e0c16ab8d9b7e732b1e1532b5ef699889632637c7ea41b75d6027
-
SHA512
9d9efd77f4a3aa4663bc3568077e76bb11791e20bebd3ef6d83155b3045936d430651b839e6f498bae937b3af8c5a07a64876a9ba043043c8dd3856004c367ba
-
SSDEEP
3072:dsWe7t0jzKDDeJIdUEBaFwBGDT2ybboZPs1MoUD+N5GPKLi1dgj:2nlnPdpaFwBGDKybb4PUUDW5GPn/
Malware Config
Extracted
njrat
:2000
Extracted
xworm
192.168.100.28:7777
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Targets
-
-
Target
PanelExecutorV11.exe_bound.exe
-
Size
196KB
-
MD5
383c7f9f75adf2764857393fbf1f21e3
-
SHA1
cf6f36d1fe32d2e584c64cc191324385d6944766
-
SHA256
ee75d0a55a2e0c16ab8d9b7e732b1e1532b5ef699889632637c7ea41b75d6027
-
SHA512
9d9efd77f4a3aa4663bc3568077e76bb11791e20bebd3ef6d83155b3045936d430651b839e6f498bae937b3af8c5a07a64876a9ba043043c8dd3856004c367ba
-
SSDEEP
3072:dsWe7t0jzKDDeJIdUEBaFwBGDT2ybboZPs1MoUD+N5GPKLi1dgj:2nlnPdpaFwBGDKybb4PUUDW5GPn/
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Disables Task Manager via registry modification
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1