General
-
Target
l8.exe
-
Size
172KB
-
Sample
240921-xgz6lsxepa
-
MD5
edd8bae5fe188057ed92b6e17eb263f0
-
SHA1
2bdb5eedb82b537b2696f81e2e1ddfe41b01b290
-
SHA256
e9bd4eaba6b99ee71e48599ae4090cabcd5da86d7fdd5b49836ba172a5c096cb
-
SHA512
bbe7309aa938a33b82d98ca27629579988c650d02ce9575c61c5c30a8b66eb6c9f314698f0ba60f9f2442438d7cb18316482ac5cdb03766df1cba7ddd5779cc0
-
SSDEEP
3072:AMobR7ezAjLOZvmX1U5GWp1icKAArDZz4N9GhbkrNEk1uzY:1eR7eammsp0yN90QEp
Static task
static1
Behavioral task
behavioral1
Sample
l8.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
127.0.0.1:3232
l838.ddns.net:3232
0x365c3e6EeF15a2938FC7267D5A3386c8e23aBc5F:123
-
Install_directory
%ProgramData%
-
install_file
Windows Security Wrapper.exe
Extracted
asyncrat
L838 RAT v1.0.0
Default
127.0.0.1:54984
l838.ddns.net:54984
kswxiqghhjgkjqpqzz
-
delay
3
-
install
true
-
install_file
Windows Service Wrapper.exe
-
install_folder
%programdata%
Targets
-
-
Target
l8.exe
-
Size
172KB
-
MD5
edd8bae5fe188057ed92b6e17eb263f0
-
SHA1
2bdb5eedb82b537b2696f81e2e1ddfe41b01b290
-
SHA256
e9bd4eaba6b99ee71e48599ae4090cabcd5da86d7fdd5b49836ba172a5c096cb
-
SHA512
bbe7309aa938a33b82d98ca27629579988c650d02ce9575c61c5c30a8b66eb6c9f314698f0ba60f9f2442438d7cb18316482ac5cdb03766df1cba7ddd5779cc0
-
SSDEEP
3072:AMobR7ezAjLOZvmX1U5GWp1icKAArDZz4N9GhbkrNEk1uzY:1eR7eammsp0yN90QEp
-
Detect Xworm Payload
-
Async RAT payload
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1