General
-
Target
portmapper-2.2.3.exe
-
Size
5.2MB
-
Sample
240917-rhnajsxamc
-
MD5
9f14a0573f96ce3c3374044e585f7eb0
-
SHA1
88247dac3c2a4e5a760c215436a99afe9ad5577f
-
SHA256
e5f62be708a0caa8b4e5dfcf07127eabc49a8a61a300f434367718b7e7c2e7e3
-
SHA512
f1e5af30c5c251a294998eb15cef22d22c6e30c900e08d86721ad3bfe400b86b8866c8ec66082014f3f3da2fb576a4cf35f1ff9e1f36d1dad26403fa96f9f91b
-
SSDEEP
98304:rqw3fQlyOEaEyr9QsYhzAkSuwnu0J74Ijb4eDaJo99AXvhdkfx5:rqw3fsVPYa7J7zjxae7iZdK
Static task
static1
Malware Config
Extracted
xworm
127.0.0.1:3232
l838.ddns.net:3232
0x365c3e6EeF15a2938FC7267D5A3386c8e23aBc5F:123
-
Install_directory
%ProgramData%
-
install_file
Windows Security Wrapper.exe
Extracted
asyncrat
L838 RAT v1.0.0
Default
127.0.0.1:54984
l838.ddns.net:54984
kswxiqghhjgkjqpqzz
-
delay
3
-
install
true
-
install_file
Windows Service Wrapper.exe
-
install_folder
%programdata%
Targets
-
-
Target
portmapper-2.2.3.exe
-
Size
5.2MB
-
MD5
9f14a0573f96ce3c3374044e585f7eb0
-
SHA1
88247dac3c2a4e5a760c215436a99afe9ad5577f
-
SHA256
e5f62be708a0caa8b4e5dfcf07127eabc49a8a61a300f434367718b7e7c2e7e3
-
SHA512
f1e5af30c5c251a294998eb15cef22d22c6e30c900e08d86721ad3bfe400b86b8866c8ec66082014f3f3da2fb576a4cf35f1ff9e1f36d1dad26403fa96f9f91b
-
SSDEEP
98304:rqw3fQlyOEaEyr9QsYhzAkSuwnu0J74Ijb4eDaJo99AXvhdkfx5:rqw3fsVPYa7J7zjxae7iZdK
-
Detect Xworm Payload
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1