Resubmissions

23-10-2024 11:04

241023-m6b5zaybnp 10

23-10-2024 11:01

241023-m4ne8ayaqp 10

23-10-2024 10:58

241023-m21b1ayajq 10

General

  • Target

    xworm.exe

  • Size

    107.2MB

  • Sample

    241023-m4ne8ayaqp

  • MD5

    ad87053cd761d16cc7970018894e4708

  • SHA1

    48b144b4ef06d233fe851683744f0e89bbbd07bc

  • SHA256

    045ce799b02a14884bdbf2f86c608b33164b29c1a236095fed1c4009d79762a0

  • SHA512

    7a784dec5f2b2db026ba8334f571ff48e509f4c6552e2211dc8dd04753c716204e73ecc3e7611162f4c5a6db896eec79d8ba47be5fdad95ff9be12b4bbbbbd7f

  • SSDEEP

    3145728:nUer7RS6xjKcBa6/2qHO5iFpBnG0iWMstB2OxQmyD7:UYFSWNa6NHCibhieB

Malware Config

Targets

    • Target

      xworm.exe

    • Size

      107.2MB

    • MD5

      ad87053cd761d16cc7970018894e4708

    • SHA1

      48b144b4ef06d233fe851683744f0e89bbbd07bc

    • SHA256

      045ce799b02a14884bdbf2f86c608b33164b29c1a236095fed1c4009d79762a0

    • SHA512

      7a784dec5f2b2db026ba8334f571ff48e509f4c6552e2211dc8dd04753c716204e73ecc3e7611162f4c5a6db896eec79d8ba47be5fdad95ff9be12b4bbbbbd7f

    • SSDEEP

      3145728:nUer7RS6xjKcBa6/2qHO5iFpBnG0iWMstB2OxQmyD7:UYFSWNa6NHCibhieB

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks