Resubmissions

17-09-2024 21:20

240917-z6styawanp 10

07-09-2024 15:18

240907-spsdhszekm 3

General

  • Target

    c22dc50dc2bbe4422c7f68d26ab95eb9.zip

  • Size

    27KB

  • Sample

    240917-z6styawanp

  • MD5

    31be67fea166d4f1c4278bd81f041b66

  • SHA1

    24a0611f17ff0f84dd2b540a96dacb3ac4bd334b

  • SHA256

    08f327fa721faf4fa748844b307ffb66ee56370e705c0b34942d4084a88ab469

  • SHA512

    a989b2b108033c4c81b77c8dc6e2de0d0d593cbd4b65dcfa54f967569df56f56a05eb0b92e7bd0bb6cce024ac11ed449939291d815c1a60cd9a8dd8c88b72995

  • SSDEEP

    768:Iuj5YRauxrSE6oYBaKKAy9hkzxv7e6tDLS/:PEamP6oPKyYzxaeo

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg

exe.dropper

https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7000

Mutex

pkJ7wMfjO0FqUPb3

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      c22dc50dc2bbe4422c7f68d26ab95eb9.js

    • Size

      92KB

    • MD5

      abbf8daa7bcdaca739f4d3fc4ebae091

    • SHA1

      1706784a398f62b28b178ca471446ed2dbb2aee9

    • SHA256

      a58fe10a096397b8eb9404af4ab8dfe14b1d88ae043f480f93697591ae262626

    • SHA512

      91d0b100ee6f708f4708e7e3ae9a7407c53a3e16f3fb58ea79b15751bf5edb1cfde75184ae0c7e3148ddc0170d9b8ad587cedbc856f10c8f40b2a62e13d56e9e

    • SSDEEP

      1536:JiPdxrC3WtVFyIcQwYJWOlA/Zk0pRZw6lw1rPTf:J+w2WhlprwXpTf

    • Detect Xworm Payload

    • XenArmor Suite

      XenArmor is as suite of password recovery tools for various application.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Looks for Xen service registry key.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks