General

  • Target

    MEMORYCODESTEALERFROMEXE.exe

  • Size

    1.2MB

  • Sample

    241103-ranaksylgr

  • MD5

    e9484520c0af2af421fc682c1e757c76

  • SHA1

    423650cf9f48cf8cdaaac4ed9b5362eadbd0ce90

  • SHA256

    1e2e67e75639830b4e39698bd9c7679d64393b435ab38fc8f07926f7ba36636b

  • SHA512

    099f04bf9fa854eab58d3ec1121f47b2af326bfb560cd14cfb0ad439e0ab575ded05a164ed4a130e0a19c4d1e521f0fa3b0277114f088c7f607e4d4c1b359fa7

  • SSDEEP

    24576:BwRW7N5+l5c/PNRDtual8WDSBHkiEToNkuPpVQN561xtDNwt:BwE7N565SPNRDYqfDSBLwShPAN5c3DK

Score
10/10

Malware Config

Extracted

Family

xworm

C2

147.185.221.21:27938

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    svchost.exe

  • telegram

    https://api.telegram.org/bot6575053517:AAHfQSqLTvzOajvn1QldlaGUVj-u9hK2upc/sendMessage?chat_id=7492036336

Targets

    • Target

      MEMORYCODESTEALERFROMEXE.exe

    • Size

      1.2MB

    • MD5

      e9484520c0af2af421fc682c1e757c76

    • SHA1

      423650cf9f48cf8cdaaac4ed9b5362eadbd0ce90

    • SHA256

      1e2e67e75639830b4e39698bd9c7679d64393b435ab38fc8f07926f7ba36636b

    • SHA512

      099f04bf9fa854eab58d3ec1121f47b2af326bfb560cd14cfb0ad439e0ab575ded05a164ed4a130e0a19c4d1e521f0fa3b0277114f088c7f607e4d4c1b359fa7

    • SSDEEP

      24576:BwRW7N5+l5c/PNRDtual8WDSBHkiEToNkuPpVQN561xtDNwt:BwE7N565SPNRDYqfDSBLwShPAN5c3DK

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks