General
-
Target
minty.exe
-
Size
438KB
-
Sample
240821-ng2j1ayhrj
-
MD5
2375624b17828d50bfb4abcbfcae4d99
-
SHA1
9abbe47e84017ba2e2084dd0a8b43af186075797
-
SHA256
0ba605ac5b2ee7e27e05847fc73c510264b5184c8645d17eaa68fbd8cfed2b49
-
SHA512
eae4253835aff30e2cdac51a7abd79a0466c12c80ceea24a7f6b856e5dc711ae710fee92d0a835c8a60a4b7c160551958a57ff32315ade1d91caa568778eca1f
-
SSDEEP
6144:YKKVG4XLA4q9/9CL7S7Js8jMXsCiG2OI3a1sGJMXsCig9uBWcj:Yzbq9/TFTYX0dOI3Oj2X0GuI
Static task
static1
Behavioral task
behavioral1
Sample
minty.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
3.0
sites-sing.gl.at.ply.gg:61490
9j2ptOtYGGbXbFUF
-
Install_directory
%Public%
-
install_file
USB.exe
Extracted
phemedrone
https://api.telegram.org/bot7375773294:AAFZUnpXCxGuVizu2hOj5WMYl9ULnbeqZ6c/sendDocument
Targets
-
-
Target
minty.exe
-
Size
438KB
-
MD5
2375624b17828d50bfb4abcbfcae4d99
-
SHA1
9abbe47e84017ba2e2084dd0a8b43af186075797
-
SHA256
0ba605ac5b2ee7e27e05847fc73c510264b5184c8645d17eaa68fbd8cfed2b49
-
SHA512
eae4253835aff30e2cdac51a7abd79a0466c12c80ceea24a7f6b856e5dc711ae710fee92d0a835c8a60a4b7c160551958a57ff32315ade1d91caa568778eca1f
-
SSDEEP
6144:YKKVG4XLA4q9/9CL7S7Js8jMXsCiG2OI3a1sGJMXsCig9uBWcj:Yzbq9/TFTYX0dOI3Oj2X0GuI
-
Detect Xworm Payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-