General
-
Target
Crypto ScarleTT.zip
-
Size
100.5MB
-
Sample
241102-vxsqcstkhn
-
MD5
f72c382de5e87ccd123c1e623254ed3f
-
SHA1
bfe62a5988a7a5b97b5e6a63e1bcae2a4c43f18d
-
SHA256
8d06880ffcc7799c543488ecfc190f0ff920ec8aeb24e258c4cf37585be16a0b
-
SHA512
fb7b1a45315c21d38b8e56dfea0f257df6cf527c1a59af906f595b76bcb17c7e1602479e57ebbf185de433ace56bb4521d463c6117c566e5dc4486e95965023f
-
SSDEEP
1572864:4fqo94gbSX8+3k43neZYWqbY4lhz++RVb7tN2uQm64il0s62a8cBdOLRWjqBaw:4yof4ge0Sz+ALtQv0s6RULsed
Behavioral task
behavioral1
Sample
Crypto ScarleTT.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Crypto ScarleTT.zip
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
SLL.casacam.net:4444
-
Install_directory
%LocalAppData%
-
install_file
Interrupi.exe
Extracted
https://github.com/NGROKC/CTC/raw/main/CTC64.dll
Targets
-
-
Target
Crypto ScarleTT.zip
-
Size
100.5MB
-
MD5
f72c382de5e87ccd123c1e623254ed3f
-
SHA1
bfe62a5988a7a5b97b5e6a63e1bcae2a4c43f18d
-
SHA256
8d06880ffcc7799c543488ecfc190f0ff920ec8aeb24e258c4cf37585be16a0b
-
SHA512
fb7b1a45315c21d38b8e56dfea0f257df6cf527c1a59af906f595b76bcb17c7e1602479e57ebbf185de433ace56bb4521d463c6117c566e5dc4486e95965023f
-
SSDEEP
1572864:4fqo94gbSX8+3k43neZYWqbY4lhz++RVb7tN2uQm64il0s62a8cBdOLRWjqBaw:4yof4ge0Sz+ALtQv0s6RULsed
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1