Resubmissions

25-08-2024 04:35

240825-e763qsvdnh 1

25-08-2024 04:35

240825-e7zzesvdmh 10

17-08-2024 23:21

240817-3b5f2awbjn 10

17-08-2024 23:03

240817-21rqssvdpq 10

17-08-2024 06:42

240817-hge34sscnc 10

17-08-2024 06:24

240817-g6j8pa1gkg 10

17-08-2024 05:49

240817-gh7dbatbrp 10

17-08-2024 03:15

240817-dr4f8sthpe 10

General

  • Target

    systemruntimes.bat

  • Size

    3.0MB

  • Sample

    240817-dr4f8sthpe

  • MD5

    6c546242564cda9fc4fee896e366cacd

  • SHA1

    3a753043686d6da8cb7fbd193fe2179ce4727b03

  • SHA256

    09074b2fe4ff12e79e75f850359a3ee191027ebf39e4a6c0ea7e70dcadc0c2d1

  • SHA512

    2d932be458f773054bb175d531a20b1b0aebc10f2ecac0d2f2de364f9c6be9661e49fb29f6159092e46d7340fc361560eb121405625ae8a4c46594f9acf92222

  • SSDEEP

    12288:Iqly9ZqhqhqhqhqhqhqClypypypypy/lBu0jAJgtfEoMCxqC6EyAnMFU/pv:IIyZ888888BOOOOq/u1gQwqbAM4v

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

a9DusJ8RwQTWHwj3

Attributes
  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/jkmUR9iK

aes.plain

Targets

    • Target

      systemruntimes.bat

    • Size

      3.0MB

    • MD5

      6c546242564cda9fc4fee896e366cacd

    • SHA1

      3a753043686d6da8cb7fbd193fe2179ce4727b03

    • SHA256

      09074b2fe4ff12e79e75f850359a3ee191027ebf39e4a6c0ea7e70dcadc0c2d1

    • SHA512

      2d932be458f773054bb175d531a20b1b0aebc10f2ecac0d2f2de364f9c6be9661e49fb29f6159092e46d7340fc361560eb121405625ae8a4c46594f9acf92222

    • SSDEEP

      12288:Iqly9ZqhqhqhqhqhqhqClypypypypy/lBu0jAJgtfEoMCxqC6EyAnMFU/pv:IIyZ888888BOOOOq/u1gQwqbAM4v

    • Detect Xworm Payload

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks for any installed AV software in registry

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks