General

  • Target

    GTA ONLINE QUEST.txt

  • Size

    5KB

  • Sample

    240812-v288xawbke

  • MD5

    cefbb39e28c2736956e5ff560b7592b4

  • SHA1

    b6af6a91f118cbaff728a213ee205bff78995f55

  • SHA256

    5abb51a13fe99203cb082d897f2a48e1d30766c28ba1180977a9807b55ccc22d

  • SHA512

    c6c9585b4c0d609767f66b9b80643f5ea688ddf4ea59f9f420db4340aa179719e3ca6cb0f325e33253c1346842fb6a3b0252f1e0a6fd61b6b76d514bd7431545

  • SSDEEP

    96:+b3IXPOqRfbk9bbdiZSxUcUk9+GdiofOxN+75p4j7NvLwNiUlxAlT6l:+b4tEbbfxUcUk9bUofOW5p49vLKxiU

Malware Config

Extracted

Family

toxiceye

C2

https://api.telegram.org/bot5687152406:AAFin_LYFhJGLydMgYheeUDec-2orew51aM/sendMessage?chat_id=2024893777

Extracted

Family

xworm

C2

127.0.0.1:7000

Mutex

6LgoART3hAaWLFr2

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

gurcu

C2

https://api.telegram.org/bot5687152406:AAFin_LYFhJGLydMgYheeUDec-2orew51aM/sendMessage?chat_id=2024893777

Targets

    • Target

      GTA ONLINE QUEST.txt

    • Size

      5KB

    • MD5

      cefbb39e28c2736956e5ff560b7592b4

    • SHA1

      b6af6a91f118cbaff728a213ee205bff78995f55

    • SHA256

      5abb51a13fe99203cb082d897f2a48e1d30766c28ba1180977a9807b55ccc22d

    • SHA512

      c6c9585b4c0d609767f66b9b80643f5ea688ddf4ea59f9f420db4340aa179719e3ca6cb0f325e33253c1346842fb6a3b0252f1e0a6fd61b6b76d514bd7431545

    • SSDEEP

      96:+b3IXPOqRfbk9bbdiZSxUcUk9+GdiofOxN+75p4j7NvLwNiUlxAlT6l:+b4tEbbfxUcUk9bUofOW5p49vLKxiU

    • Detect Xworm Payload

    • Detect rhadamanthys stealer shellcode

    • Gurcu, WhiteSnake

      Gurcu is a malware stealer written in C#.

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • ToxicEye

      ToxicEye is a trojan written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks