General

  • Target

    Danger-MultiTool-main.zip

  • Size

    8.5MB

  • Sample

    241005-nqerlasckn

  • MD5

    9d7e69eb59178c2c8a5cb30ea2cffb2b

  • SHA1

    077e4230fedb512dee79b8de3a2db4bc1e3861db

  • SHA256

    64cbe38d240af0d473e99da2880b6b24bda99c2e080d743ca70a7c63c6c39082

  • SHA512

    ff918fc2b5863c4425d2b49b0a0737bd7d01973c2547437216608e7527fa8bcbc0d0edb39ac16702efd06cc43fc9e4ef98c1c6ae276baeda3a228ebdd9779d49

  • SSDEEP

    196608:evtyXaw/YhZIINyMGkXmyQscGZ0UDh9eAxcqctMy4yD:eFyqEqIINyMGkXUscGFDh9eAxYlD

Malware Config

Extracted

Family

xworm

C2

45.83.246.140:30120

Attributes
  • Install_directory

    %AppData%

  • install_file

    runtime.exe

Targets

    • Target

      Danger-MultiTool-main/src/main.py

    • Size

      13KB

    • MD5

      c48f27c10efb969ac31147a787860fb9

    • SHA1

      611c119923825407e300cc86ec258669b0224ebd

    • SHA256

      984c5a8704a16386a31fb31f903da7c24a7b67c224906be88039ea15ead84286

    • SHA512

      fd23d04786f93d5e2440912b71d83df15b100e2bd286e68e32cfb7ce23eb9f346c531fe822fc953c1eccbaf6395b63acc7697851ebc608834e5852a15056141c

    • SSDEEP

      384:MG87mbbEB8IXCa7bujRs8pWS+QinACIBadXGxuapdBeYyil4TKl17+Ryf3urqpMG:MG+mba8IXCa7bujRs8pWS+QinACIBad+

    Score
    3/10
    • Target

      Danger-MultiTool-main/src/utils/__pycache__/cpython-311.pyc

    • Size

      7.4MB

    • MD5

      1a2ff293768d10b8c99d3cd2950164b9

    • SHA1

      e9123a3d2a53b5f8d008db9608037dd0571f3cae

    • SHA256

      3c09a37412bf3981e5d678b6598c2cdad32fcd6761fc649a50693ba45746e242

    • SHA512

      ff8a853675431bc36d88288546d7f467f239ae2e4e7ef019476ac4ca06f715e88f201753d7201dbfacb3b6dca51be764036372de8a8c0def29e00ae5e9469941

    • SSDEEP

      98304:FWeYgI6OshoKyDvuIYc5AhV+gEc4kZvRLoI0EJfNA3z5UTfHfyk6LK4dSI23o7yc:FPYmOshoKMuIkhVastRL5Di3tO/ys42O

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      Danger-MultiTool-main/src/utils/upx.exe

    • Size

      69KB

    • MD5

      a230d428e97911ce6959e1463d781257

    • SHA1

      0946c13059bf98fd3aacefd0b2681a42b95292cd

    • SHA256

      c8e088feb7de05c3852af588c1a440f61d06870a93b07a3c6b7e2c12c9d55b12

    • SHA512

      089f7f6e979729ba037a19510be160d1c407c712fa01614815ce2427ff6c8fe7fa80a2cb673a36611dc37734aba63f7c87832c3848ac9ce011343c0e15b7aa68

    • SSDEEP

      1536:KWEyI4XFyV0UUIRiZAkupj9bIu9uLhQSOIcoFqXgG:KWnIiyVxRiij9bIYYhdOBuqXz

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Drops startup file

    • Adds Run key to start application

    • Target

      Danger-MultiTool-main/start.bat

    • Size

      121B

    • MD5

      c7bda38ca7b6acff98cfce8e087ece33

    • SHA1

      d2d7b7c6757870ef3a7ff3a40678e74176a4676e

    • SHA256

      8caedbf5a91ed11823eb4d35ac84720e692246a17db1dd70e42d1565540d5842

    • SHA512

      7732f4fb081f71bb0a8545a033ddfc35ec6901aec49735926718466d7155f623c482a83871fc3cb9c18fae17c9ce3ee008ea4effb74cce33b7034b8ad0ad0b7a

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks