General
-
Target
https://files.this.ovh/XWorm%20V5.3.7z
-
Sample
240825-ey3c7awcqq
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://files.this.ovh/XWorm%20V5.3.7z
Resource
win11-20240802-en
agentteslastormkittyxwormagilenetdiscoveryevasionkeyloggerpersistenceprivilege_escalationratspywarestealertrojan
windows11-21h2-x64
28 signatures
600 seconds
Malware Config
Extracted
Family
xworm
Version
5.0
C2
127.0.0.1:7000
Mutex
9BF6bCCON3pEOHij
Attributes
-
install_file
USB.exe
aes.plain
aes.plain
Targets
-
-
Target
https://files.this.ovh/XWorm%20V5.3.7z
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Modifies visiblity of hidden/system files in Explorer
-
StormKitty payload
-
AgentTesla payload
-
Executes dropped EXE
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Uses the VBS compiler for execution
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-