General

  • Target

    erteterteret.exe

  • Size

    177KB

  • Sample

    240818-w742taxfnb

  • MD5

    858162036ca676172602e7f20396294d

  • SHA1

    98a1816c6f93aad44e89bbd40ffc5be75528fff6

  • SHA256

    3706d906a279ab466f5c526dea3e804ce378ac164fcdc49a1184190669f8f934

  • SHA512

    9206535c14c4a2c61d06f5e52ffc513663c73c00d4ac2dae7f9f0f038a503e091e8a003d794674df2b23f8d23f3e7ecba956c3d24a77babc73cd83cda2b114c4

  • SSDEEP

    3072:W9vmZA2wRabTfnm/KOYqPtBz65/M6If+3Js+3JFkKeTn6:W9gdw0bzmMExBt25

Malware Config

Extracted

Family

xworm

C2

email-champions.gl.at.ply.gg:33429

took-chance.gl.at.ply.gg:33429

Attributes
  • Install_directory

    %AppData%

  • install_file

    MsBusDriver.exe

  • telegram

    https://api.telegram.org/bot6814850214:AAGtrnkhUh3vMq-wH7W5cvNuSWLdcy7mtis/sendMessage?chat_id=7094837950

Extracted

Family

gurcu

C2

https://api.telegram.org/bot6814850214:AAGtrnkhUh3vMq-wH7W5cvNuSWLdcy7mtis/sendMessage?chat_id=7094837950

Targets

    • Target

      erteterteret.exe

    • Size

      177KB

    • MD5

      858162036ca676172602e7f20396294d

    • SHA1

      98a1816c6f93aad44e89bbd40ffc5be75528fff6

    • SHA256

      3706d906a279ab466f5c526dea3e804ce378ac164fcdc49a1184190669f8f934

    • SHA512

      9206535c14c4a2c61d06f5e52ffc513663c73c00d4ac2dae7f9f0f038a503e091e8a003d794674df2b23f8d23f3e7ecba956c3d24a77babc73cd83cda2b114c4

    • SSDEEP

      3072:W9vmZA2wRabTfnm/KOYqPtBz65/M6If+3Js+3JFkKeTn6:W9gdw0bzmMExBt25

    • Detect Xworm Payload

    • Gurcu, WhiteSnake

      Gurcu is a malware stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks