General

  • Target

    Release.rar

  • Size

    27.0MB

  • Sample

    240903-zff3fswfmk

  • MD5

    81f706252f541dd8a1e3ad3140aa3151

  • SHA1

    8a1bfb57d8ef950d04555a94af0304d2aad202d0

  • SHA256

    f6d30737ce669f8a1c075d6712309a9af6dd3bc5d6e3b5c6baf4f35c886a65bc

  • SHA512

    f069e96bc16e9c4c5f62a0f4ce6fd3d8c4f6a9dfde787e01bbb10d43579c320105716d6ba890b6d4459a30693a997c7956b0f4da06015876c4198677dd159d84

  • SSDEEP

    786432:QJE3uT7PTSNbLr0bMlw+dyzci2a6mrmQY/IJ:QJE3qbTSNbEbz0bi2QmpIJ

Malware Config

Extracted

Family

xworm

C2

C0re-51178.portmap.host:51178

Attributes
  • Install_directory

    %Public%

  • install_file

    svchost.exe

Targets

    • Target

      fix.exe

    • Size

      73KB

    • MD5

      b7b56d4bc5019b4b679714d2be92bfae

    • SHA1

      2de2e4a0fcbca05d5e404458c5ee97e3ae446588

    • SHA256

      2d10f1ac9b2e5ef7f246f35f39af12fa70054a8eaa7b7c200961241b49468dc5

    • SHA512

      1802eb959489d01ed4c56c5ea1f7729432be21513c2cd4c141cf7491c9741158dc5095247a73c2023dae6b61a93c78d698a7a12f38a4b4004dfccedc7ac43ad3

    • SSDEEP

      1536:wY/jBSSiM/oHseUtR0DVRfgeoOzIbKyLZhb1z0f:w+H1/1tRkWeoOovOf

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • AgentTesla payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks