General
-
Target
NovaManagerInstaller (4).exe
-
Size
2.8MB
-
Sample
240901-zwe54a1gkr
-
MD5
3055a388e5f9b721da480f312807373f
-
SHA1
1dbb315c1c6c11248d153957d1eff47db605ce4e
-
SHA256
24ccac765017c273b8b75b27e77dca90feccf19cbd149567fe58b07e87bba443
-
SHA512
e7a1dcabdda47f13e2aaf5af02943bd916a17271b9b6c6f954f531aad0e3984788dc7c65bdbc4a1ac528c2a261533a461fe5fdc5106cb2a1d6bbc1a586926010
-
SSDEEP
49152:MXYD0FANdWDaBYYj5cMX8nal2Wi1LIXQlY8ilFf9F6MA0crNn1c7bT76:MXY2DQj5ca8l3iff9krB8bTW
Static task
static1
Behavioral task
behavioral1
Sample
NovaManagerInstaller (4).exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
NovaManagerInstaller (4).exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
5.0
every-cg.gl.at.ply.gg:5872
OwcUM7wMu7X3270J
-
Install_directory
%ProgramData%
-
install_file
Microsoft OneDrive.exe
Extracted
xworm
lijaligibidu-35558.portmap.host:35558
-
Install_directory
%AppData%
-
install_file
Windows Security.exe
Targets
-
-
Target
NovaManagerInstaller (4).exe
-
Size
2.8MB
-
MD5
3055a388e5f9b721da480f312807373f
-
SHA1
1dbb315c1c6c11248d153957d1eff47db605ce4e
-
SHA256
24ccac765017c273b8b75b27e77dca90feccf19cbd149567fe58b07e87bba443
-
SHA512
e7a1dcabdda47f13e2aaf5af02943bd916a17271b9b6c6f954f531aad0e3984788dc7c65bdbc4a1ac528c2a261533a461fe5fdc5106cb2a1d6bbc1a586926010
-
SSDEEP
49152:MXYD0FANdWDaBYYj5cMX8nal2Wi1LIXQlY8ilFf9F6MA0crNn1c7bT76:MXY2DQj5ca8l3iff9krB8bTW
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Xworm Payload
-
AgentTesla payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory
-