General
-
Target
NatroMacro_1.21.1.exe
-
Size
158KB
-
Sample
240905-qqe4ga1hmm
-
MD5
b58d2c1a2f6a201a728290eec00c8a3b
-
SHA1
5fb16485ee1e9c57b1d5025d58772cc4b8816c78
-
SHA256
fb95f5794977ee889f82cb0720e65dfd4af77576b1a321499cd1b94322b1902f
-
SHA512
fbf6d2e9b3b1b8c1ead35540d35f5a434c9ae87b4edf60a8ea421beabb3cce055a0e03141cdd5cf777a5bd7b7b75c9d11dcec4d6061acb9f862ebe40a1df5c94
-
SSDEEP
3072:CIhse1Jb5cKsEzL+rsOGca/4Bz65/M6If+3Js+3JFkKeTn7:HhdbxzLrQxBt25
Behavioral task
behavioral1
Sample
NatroMacro_1.21.1.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
NatroMacro_1.21.1.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
engineering-thoroughly.gl.at.ply.gg:32901
20.ip.gl.ply.gg:32901
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
NatroMacro_1.21.1.exe
-
Size
158KB
-
MD5
b58d2c1a2f6a201a728290eec00c8a3b
-
SHA1
5fb16485ee1e9c57b1d5025d58772cc4b8816c78
-
SHA256
fb95f5794977ee889f82cb0720e65dfd4af77576b1a321499cd1b94322b1902f
-
SHA512
fbf6d2e9b3b1b8c1ead35540d35f5a434c9ae87b4edf60a8ea421beabb3cce055a0e03141cdd5cf777a5bd7b7b75c9d11dcec4d6061acb9f862ebe40a1df5c94
-
SSDEEP
3072:CIhse1Jb5cKsEzL+rsOGca/4Bz65/M6If+3Js+3JFkKeTn7:HhdbxzLrQxBt25
-
Detect Xworm Payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1