Resubmissions
02-09-2024 19:47
240902-yhtwnawbqm 802-09-2024 19:44
240902-yf71haxbmd 602-09-2024 16:42
240902-t7z2ravemf 602-09-2024 04:27
240902-e28pda1gjm 602-09-2024 04:25
240902-e2agks1fqp 602-09-2024 04:23
240902-ez6f8ssepa 602-09-2024 04:20
240902-eydd3asela 624-08-2024 02:54
240824-dd53xashql 10General
-
Target
sticking-out-your-gyatt-for-the-rizzler.mp3
-
Size
175KB
-
Sample
240824-dd53xashql
-
MD5
27b535b4401ff51e152ef5f6fdaa2b5c
-
SHA1
eec3bba56eae9ff73d527c3638f3515d1c60da9b
-
SHA256
1381fa3fc79389ad8e9c2f4acffda477c4b5c6e45a07fec9de523de30ee9efa8
-
SHA512
9e322aef6c0c41f16fd0e101b89766032240570addba1a3be77b48207bc60c50a9ec3fbe82da9925d8d878ef111b625e629c05ee3dc23e30df10f8c523c8515e
-
SSDEEP
3072:nU/Sk+yOMHjhLbJdTJ/ffFFxEuy1hqFXNQlPgoTzS+GpQE4pCUW4hkFTMRsHeV8L:nUK1yTdLbJrXPxEuy1jFJkpaxBV6
Static task
static1
Malware Config
Extracted
xworm
3.1
next-screening.at.ply.gg:48590
-
Install_directory
%AppData%
-
install_file
chrome.exe
Targets
-
-
Target
sticking-out-your-gyatt-for-the-rizzler.mp3
-
Size
175KB
-
MD5
27b535b4401ff51e152ef5f6fdaa2b5c
-
SHA1
eec3bba56eae9ff73d527c3638f3515d1c60da9b
-
SHA256
1381fa3fc79389ad8e9c2f4acffda477c4b5c6e45a07fec9de523de30ee9efa8
-
SHA512
9e322aef6c0c41f16fd0e101b89766032240570addba1a3be77b48207bc60c50a9ec3fbe82da9925d8d878ef111b625e629c05ee3dc23e30df10f8c523c8515e
-
SSDEEP
3072:nU/Sk+yOMHjhLbJdTJ/ffFFxEuy1hqFXNQlPgoTzS+GpQE4pCUW4hkFTMRsHeV8L:nUK1yTdLbJrXPxEuy1jFJkpaxBV6
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1