General
-
Target
EXMservice.exe
-
Size
12.0MB
-
Sample
240818-yxv29ssama
-
MD5
f189114f5f8504a1aeb97a90e71ea429
-
SHA1
a2d029f042000b7e3ec175e1e365d9bf20396092
-
SHA256
31709442f1ff903433dec01461829a0c05b62f0e7cab81f2efcd1a0b0845d748
-
SHA512
5f939df2c5bc1f3c4f5b1fd835a7ab882d49fed5c5ebd7a41deba37b3f7ba423d194ccaad39aa3032d9454570d8863bdb93cca9c99ee12cf64dbc478b2dfcbbb
-
SSDEEP
6144:pcBqNKm+UQqA9uAXTNpWKc9SNweSuRQjbvmpFETPMK3nYpbLYhZ+:pkCKm+UQqAP7WKc9SNavmpOTZ3WuM
Static task
static1
Behavioral task
behavioral1
Sample
EXMservice.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
EXMservice.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
-
Install_directory
%ProgramData%
-
install_file
MicrosoftEdgeUpdate.exe
-
pastebin_url
https://pastebin.com/raw/ZnhxAV6a
-
telegram
https://api.telegram.org/bot6701075763:AAGkvv2CpqBxGihH8FtOkSA7Uxy35GZpAFI/sendMessage?chat_id=5991331733
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6701075763:AAGkvv2CpqBxGihH8FtOkSA7Uxy35GZpAFI/sendMessage?chat_id=5991331733
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
EXMservice.exe
-
Size
12.0MB
-
MD5
f189114f5f8504a1aeb97a90e71ea429
-
SHA1
a2d029f042000b7e3ec175e1e365d9bf20396092
-
SHA256
31709442f1ff903433dec01461829a0c05b62f0e7cab81f2efcd1a0b0845d748
-
SHA512
5f939df2c5bc1f3c4f5b1fd835a7ab882d49fed5c5ebd7a41deba37b3f7ba423d194ccaad39aa3032d9454570d8863bdb93cca9c99ee12cf64dbc478b2dfcbbb
-
SSDEEP
6144:pcBqNKm+UQqA9uAXTNpWKc9SNweSuRQjbvmpFETPMK3nYpbLYhZ+:pkCKm+UQqAP7WKc9SNavmpOTZ3WuM
-
Detect Xworm Payload
-
StormKitty payload
-
Async RAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1