General

  • Target

    mainn.exe

  • Size

    28.1MB

  • Sample

    240929-s6ya4azepq

  • MD5

    14af5fd5c08fdaa64bb27a27eecef8fa

  • SHA1

    64d7140ff222476e9fced02dd280c299ef6a738a

  • SHA256

    8cd387950e8bd57026c00d9f9e0ccd17170f6d01bbc9e047f94e802162247755

  • SHA512

    6574286fd658c714c212b55c3a9f3d59c614b68bfeb04d543b184377ccd16220e2d430b9c3089f9608b4a54ee66b9f6e84a40cd631d57a3629aa572d5fab229b

  • SSDEEP

    786432:SmhBmh9xCGoeWKFD4cOBNvNi7DrhB9V0ADhDX:SIBmAGJWGDgveXhzV0A

Malware Config

Extracted

Family

xworm

C2

reason-warnings.gl.at.ply.gg:20382

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7258239318:AAE_J6DhWLSRk9YOV8l1ienRdy5HsJZuR6I/sendMessage?chat_id=-1002245526003

https://api.telegram.org/bot7258239318:AAE_J6DhWLSRk9YOV8l1ienRdy5HsJZuR6I/getUpdates?offset=-

https://api.telegram.org/bot7258239318:AAE_J6DhWLSRk9YOV8l1ienRdy5HsJZuR6I/sendDocument?chat_id=-1002245526003&caption=%F0%9F%93%B8Screenshot%20take

Targets

    • Target

      mainn.exe

    • Size

      28.1MB

    • MD5

      14af5fd5c08fdaa64bb27a27eecef8fa

    • SHA1

      64d7140ff222476e9fced02dd280c299ef6a738a

    • SHA256

      8cd387950e8bd57026c00d9f9e0ccd17170f6d01bbc9e047f94e802162247755

    • SHA512

      6574286fd658c714c212b55c3a9f3d59c614b68bfeb04d543b184377ccd16220e2d430b9c3089f9608b4a54ee66b9f6e84a40cd631d57a3629aa572d5fab229b

    • SSDEEP

      786432:SmhBmh9xCGoeWKFD4cOBNvNi7DrhB9V0ADhDX:SIBmAGJWGDgveXhzV0A

    • Detect Xworm Payload

    • Gurcu, WhiteSnake

      Gurcu is a malware stealer written in C#.

    • MilleniumRat

      MilleniumRat is a remote access trojan written in C#.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks