General
-
Target
portmapper-2.2.3.exe
-
Size
5.2MB
-
Sample
240913-x3vg9atgqk
-
MD5
9f14a0573f96ce3c3374044e585f7eb0
-
SHA1
88247dac3c2a4e5a760c215436a99afe9ad5577f
-
SHA256
e5f62be708a0caa8b4e5dfcf07127eabc49a8a61a300f434367718b7e7c2e7e3
-
SHA512
f1e5af30c5c251a294998eb15cef22d22c6e30c900e08d86721ad3bfe400b86b8866c8ec66082014f3f3da2fb576a4cf35f1ff9e1f36d1dad26403fa96f9f91b
-
SSDEEP
98304:rqw3fQlyOEaEyr9QsYhzAkSuwnu0J74Ijb4eDaJo99AXvhdkfx5:rqw3fsVPYa7J7zjxae7iZdK
Static task
static1
Malware Config
Extracted
xworm
127.0.0.1:3232
l838.ddns.net:3232
0x365c3e6EeF15a2938FC7267D5A3386c8e23aBc5F:123
-
Install_directory
%ProgramData%
-
install_file
Windows Security Wrapper.exe
Extracted
asyncrat
L838 RAT v1.0.0
Default
127.0.0.1:54984
l838.ddns.net:54984
kswxiqghhjgkjqpqzz
-
delay
3
-
install
true
-
install_file
Windows Service Wrapper.exe
-
install_folder
%programdata%
Targets
-
-
Target
portmapper-2.2.3.exe
-
Size
5.2MB
-
MD5
9f14a0573f96ce3c3374044e585f7eb0
-
SHA1
88247dac3c2a4e5a760c215436a99afe9ad5577f
-
SHA256
e5f62be708a0caa8b4e5dfcf07127eabc49a8a61a300f434367718b7e7c2e7e3
-
SHA512
f1e5af30c5c251a294998eb15cef22d22c6e30c900e08d86721ad3bfe400b86b8866c8ec66082014f3f3da2fb576a4cf35f1ff9e1f36d1dad26403fa96f9f91b
-
SSDEEP
98304:rqw3fQlyOEaEyr9QsYhzAkSuwnu0J74Ijb4eDaJo99AXvhdkfx5:rqw3fsVPYa7J7zjxae7iZdK
-
Detect Xworm Payload
-
Async RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-