Resubmissions

18-09-2024 07:14

240918-h2tr1aydjh 10

17-09-2024 21:44

240917-1ljafawhmp 10

29-08-2024 09:03

240829-k1deqstamh 3

General

  • Target

    Onaylanmayan 444858.crdownload.txt.js

  • Size

    1.6MB

  • Sample

    240918-h2tr1aydjh

  • MD5

    fe59b54235ae259b6a01a6d39068be07

  • SHA1

    d05ee8dfb996e5c16341700cc5daa74f33db6da7

  • SHA256

    34cfa8e4ae376f0ea828332a3a4654777c8f9a2ee1854e487df22012e62ab287

  • SHA512

    82d08c36623bb4138bfa1fdce477badc081ac972d345c61a02a0577ccff88080e2acb73f50993cfbe6a2e138c6e0155972505cc6e527ff0a29a8fb82e2a503fb

  • SSDEEP

    24576:C8XjU9EaEEAgwMep8vkkINtaCTtcGAiS1l2tZGEJoz4MQT70hlI:TPOc6GxU2tBKI

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg

exe.dropper

https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7000

Mutex

pkJ7wMfjO0FqUPb3

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      Onaylanmayan 444858.crdownload.txt.js

    • Size

      1.6MB

    • MD5

      fe59b54235ae259b6a01a6d39068be07

    • SHA1

      d05ee8dfb996e5c16341700cc5daa74f33db6da7

    • SHA256

      34cfa8e4ae376f0ea828332a3a4654777c8f9a2ee1854e487df22012e62ab287

    • SHA512

      82d08c36623bb4138bfa1fdce477badc081ac972d345c61a02a0577ccff88080e2acb73f50993cfbe6a2e138c6e0155972505cc6e527ff0a29a8fb82e2a503fb

    • SSDEEP

      24576:C8XjU9EaEEAgwMep8vkkINtaCTtcGAiS1l2tZGEJoz4MQT70hlI:TPOc6GxU2tBKI

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Looks for Xen service registry key.

    • Sets service image path in registry

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks