General

  • Target

    Пароль - fun.rar

  • Size

    44KB

  • Sample

    240908-gqk52ssekf

  • MD5

    b12f0b9937f1b0227841c7da177a7143

  • SHA1

    5771e6991f8e4ad6ed6d8d75ca90a0e8207c932a

  • SHA256

    6dde36f51016d0a86cce39af279d69718d7641669e4316623389b48e6ca9bba2

  • SHA512

    3c414506af3b92cd1205cab22a24f821825e770c06ed7d4a5bdfdad32f9b792429e00c6435b6885b15a9de9bc6df884a8696fdc9b5e2eaa1cc39b13c2b622b49

  • SSDEEP

    768:XLAzZqCB64Oltk8K+esBhvjtDZBq2scDTpNO/Kb7ZoJS4fPdu9DdMxSirhPDt6SE:7AFqCqHmcn7BJ7p28toYC1a2smb3zdq

Malware Config

Extracted

Family

xworm

C2

22.ip.gl.ply.gg:26725

Attributes
  • Install_directory

    %AppData%

  • install_file

    FunTimeDupe.exe

Targets

    • Target

      FunTimeDupe.exe

    • Size

      73KB

    • MD5

      4c781d300e8936e7d346aa6bb9e0d047

    • SHA1

      3fb080480e2aff550e7ee294de0d34a3848a98c1

    • SHA256

      03bb35cebf02bc267408a7e78307cf765608bf5d987e45991e2999e299de7c7a

    • SHA512

      d65deb9781ca7f3c07ada93a21d57b8aa1f63d680b9ca68151e286e45b7f1c41aa34428d08040a71bb952aa5eced1128f04eab007ec35d9bab7e804533ce68aa

    • SSDEEP

      1536:qayRZGJmhZiTySjhZDnk/9+bOvACJMea4ki/OV6JWXO3jOujo7c:qayxhZiuSjhhg+bOvrJdObO6ujec

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks