Resubmissions

22/08/2024, 11:37

240822-nrcnmaxfjp 10

General

  • Target

    Cloner.rar

  • Size

    7.8MB

  • Sample

    240822-nrcnmaxfjp

  • MD5

    868f1d27dc7df68a7bbade743b53591d

  • SHA1

    90329a5eac86f747257136c2598ec957aa52e849

  • SHA256

    6b2fa04530c63518a58edb2b16e56e5b14d2f7a25ea0b852dd0622fc43ab3d1a

  • SHA512

    5a57d4ec38725f3682169a0d2aed474fa468bd3f60d65482147ad9984d337fa8efe74d22cbd15840b1a1f46f7e7ec0fb246ab2ccf92cba8e23f4879d51c4c78d

  • SSDEEP

    196608:/KWmlZ0RoP81IKwiUzdkJOdw3vdTD36qdsXnKZ5ywXzo:/sl6VSKwV3dw3v5Kv3KZFE

Malware Config

Extracted

Family

xworm

C2

22.ip.gl.ply.gg:14237

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Svchost.exe

Targets

    • Target

      DiscordCloner1.exe

    • Size

      7.8MB

    • MD5

      2281c60616dafe2fa054b884a19326c2

    • SHA1

      131ac246d9a375dbf71af777c475e39fb428cd53

    • SHA256

      757086454e8acecdc9558e745160d6f662be0f43425e97da94097bbe990800c8

    • SHA512

      6f9e6995f140cb2b60e828bb46447f40abc79e20bd40581bca4192da4971dc06571a5986ccccfa4e06a3871571ad0a6cc22907fcdaad3f5dacf0b491cc17dc25

    • SSDEEP

      196608:JKWmlZ0RoP81IKwiUzdkJOdw3vdTD36qdsXnKZ5ywXz:Jsl6VSKwV3dw3v5Kv3KZF

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks