General

  • Target

    l8.exe

  • Size

    172KB

  • Sample

    240921-xgz6lsxepa

  • MD5

    edd8bae5fe188057ed92b6e17eb263f0

  • SHA1

    2bdb5eedb82b537b2696f81e2e1ddfe41b01b290

  • SHA256

    e9bd4eaba6b99ee71e48599ae4090cabcd5da86d7fdd5b49836ba172a5c096cb

  • SHA512

    bbe7309aa938a33b82d98ca27629579988c650d02ce9575c61c5c30a8b66eb6c9f314698f0ba60f9f2442438d7cb18316482ac5cdb03766df1cba7ddd5779cc0

  • SSDEEP

    3072:AMobR7ezAjLOZvmX1U5GWp1icKAArDZz4N9GhbkrNEk1uzY:1eR7eammsp0yN90QEp

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:3232

l838.ddns.net:3232

0x365c3e6EeF15a2938FC7267D5A3386c8e23aBc5F:123

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Windows Security Wrapper.exe

Extracted

Family

asyncrat

Version

L838 RAT v1.0.0

Botnet

Default

C2

127.0.0.1:54984

l838.ddns.net:54984

Mutex

kswxiqghhjgkjqpqzz

Attributes
  • delay

    3

  • install

    true

  • install_file

    Windows Service Wrapper.exe

  • install_folder

    %programdata%

aes.plain

Targets

    • Target

      l8.exe

    • Size

      172KB

    • MD5

      edd8bae5fe188057ed92b6e17eb263f0

    • SHA1

      2bdb5eedb82b537b2696f81e2e1ddfe41b01b290

    • SHA256

      e9bd4eaba6b99ee71e48599ae4090cabcd5da86d7fdd5b49836ba172a5c096cb

    • SHA512

      bbe7309aa938a33b82d98ca27629579988c650d02ce9575c61c5c30a8b66eb6c9f314698f0ba60f9f2442438d7cb18316482ac5cdb03766df1cba7ddd5779cc0

    • SSDEEP

      3072:AMobR7ezAjLOZvmX1U5GWp1icKAArDZz4N9GhbkrNEk1uzY:1eR7eammsp0yN90QEp

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Async RAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks