Overview
overview
10Static
static
10tool.zip
windows7-x64
1tool.zip
windows10-2004-x64
1tool/Armdo...config
windows7-x64
3tool/Armdo...config
windows10-2004-x64
3tool/Armdot Deobf.pdb
windows7-x64
3tool/Armdot Deobf.pdb
windows10-2004-x64
3tool/Guna.UI2.dll
windows7-x64
1tool/Guna.UI2.dll
windows10-2004-x64
1tool/armdo...or.exe
windows7-x64
8tool/armdo...or.exe
windows10-2004-x64
10General
-
Target
tool.zip
-
Size
1.0MB
-
Sample
240911-kvr1yasgla
-
MD5
1da7c6b4f9b60799dc9fd5d589d97f72
-
SHA1
1e08ee39733f09326bb60ebcb0a4f7b12ff1843b
-
SHA256
39508b75635805ff4fa5eaf8c7aa926529b66ae52f08460d41d8d960e75385e3
-
SHA512
6232bd7dc478b92633237dbdd93e44b56dce410f0e1e852532580bf024490e19854bcb3f80b5641692000173e045845b31bc8bd7c79dc7bfa6c1baa6e4fab006
-
SSDEEP
24576:i4PaE+vYG5FIghxbbYzB3HF6sqiLUVU/hI8WHT6Y93:RPe3IghxbMzD6sqiLUVPHT6Y93
Behavioral task
behavioral1
Sample
tool.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
tool.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
tool/Armdot Deobf.exe.config
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
tool/Armdot Deobf.exe.config
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
tool/Armdot Deobf.pdb
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
tool/Armdot Deobf.pdb
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
tool/Guna.UI2.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
tool/Guna.UI2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
tool/armdot deobfuscator.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
tool/armdot deobfuscator.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:41594
internal-bachelor.gl.at.ply.gg:41594
JgIYtyxyvTKZt7Bf
-
Install_directory
%LocalAppData%
-
install_file
svchost.exe
Targets
-
-
Target
tool.zip
-
Size
1.0MB
-
MD5
1da7c6b4f9b60799dc9fd5d589d97f72
-
SHA1
1e08ee39733f09326bb60ebcb0a4f7b12ff1843b
-
SHA256
39508b75635805ff4fa5eaf8c7aa926529b66ae52f08460d41d8d960e75385e3
-
SHA512
6232bd7dc478b92633237dbdd93e44b56dce410f0e1e852532580bf024490e19854bcb3f80b5641692000173e045845b31bc8bd7c79dc7bfa6c1baa6e4fab006
-
SSDEEP
24576:i4PaE+vYG5FIghxbbYzB3HF6sqiLUVU/hI8WHT6Y93:RPe3IghxbMzD6sqiLUVPHT6Y93
Score1/10 -
-
-
Target
tool/Armdot Deobf.exe.config
-
Size
189B
-
MD5
9dbad5517b46f41dbb0d8780b20ab87e
-
SHA1
ef6aef0b1ea5d01b6e088a8bf2f429773c04ba5e
-
SHA256
47e5a0f101af4151d7f13d2d6bfa9b847d5b5e4a98d1f4674b7c015772746cdf
-
SHA512
43825f5c26c54e1fc5bffcce30caad1449a28c0c9a9432e9ce17d255f8bf6057c1a1002d9471e5b654ab1de08fb6eabf96302cdb3e0fb4b63ba0ff186e903be8
Score3/10 -
-
-
Target
tool/Armdot Deobf.pdb
-
Size
41KB
-
MD5
b3adcf27f70b57983d9ccfe60c923e3a
-
SHA1
bb238b90a2e7e622c3a8cc5ed13172e94d2dec22
-
SHA256
28c32f5e535c16ce7ed99c3babb326ce1747200510ef5f0da60f1f6579120cdf
-
SHA512
3d12aef199183732d609e6ae11d736e7ac9c73808ff710d08be6ca9c9e2b73c6eaf80888750a0432fecf399bc0553d3be75752710fc26bfbaf2be2343dd8fd81
-
SSDEEP
384:iul+Ql+mIJd204EybE07ScnWLKy2GG7oY44410IJd2/74:iul+Ql+mIJd20OAG5c0IJd2/7
Score3/10 -
-
-
Target
tool/Guna.UI2.dll
-
Size
2.1MB
-
MD5
c19e9e6a4bc1b668d19505a0437e7f7e
-
SHA1
73be712aef4baa6e9dabfc237b5c039f62a847fa
-
SHA256
9ac8b65e5c13292a8e564187c1e7446adc4230228b669383bd7b07035ab99a82
-
SHA512
b6cd0af436459f35a97db2d928120c53d3691533b01e4f0e8b382f2bd81d9a9a2c57e5e2aa6ade9d6a1746d5c4b2ef6c88d3a0cf519424b34445d0d30aab61de
-
SSDEEP
49152:6QNztBO2+VN7N3HtnPhx70ZO4+CPXOn5PThDH2TBeHjvjiBckYf+Yh/FJ3:6Ahck2z
Score1/10 -
-
-
Target
tool/armdot deobfuscator.exe
-
Size
275KB
-
MD5
2bce10bc9bf1c5e013965c7a60deae05
-
SHA1
7efa1765b1842f4ce9e746c26c7d8394ad7820ce
-
SHA256
5e74f08923fec3a5daf99b9a6c0763b21a98226f90c537235408a4258389ca01
-
SHA512
fbfadeb3f983cc76478864de82952ce34cb7543743a3421151827c5a8226d24ddff2409f71230dfc4bbfad441cea9a148a11a31c16e3890cd5a0797fe4a9e7c0
-
SSDEEP
6144:IwDHUsnM9rwQCz8vRtKT2OyD0Ek+c9NWtO5MxRxLJcNfZ:IAjMnZtgbyD0wyWtOcJeZ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Xworm Payload
-
AgentTesla payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1